124
CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS a dissertation submitted to the department of electrical engineering and the committee on graduate studies of stanford university in partial fulfillment of the requirements for the degree of doctor of philosophy Chaohuang Zeng July 2001

CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

  • Upload
    dothuy

  • View
    221

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

CROSSTALK IDENTIFICATION AND CANCELLATION

IN DSL SYSTEMS

a dissertation

submitted to the department of electrical engineering

and the committee on graduate studies

of stanford university

in partial fulfillment of the requirements

for the degree of

doctor of philosophy

Chaohuang Zeng

July 2001

Page 2: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

c° Copyright by Chaohuang Zeng 2001

All Rights Reserved

ii

Page 3: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

I certify that I have read this dissertation and that in

my opinion it is fully adequate, in scope and quality, as

a dissertation for the degree of Doctor of Philosophy.

John M. Cioffi(Principal Adviser)

I certify that I have read this dissertation and that in

my opinion it is fully adequate, in scope and quality, as

a dissertation for the degree of Doctor of Philosophy.

John T. Gill III

I certify that I have read this dissertation and that in

my opinion it is fully adequate, in scope and quality, as

a dissertation for the degree of Doctor of Philosophy.

Kenneth Kerpez

Approved for the University Committee on Graduate

Studies:

iii

Page 4: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Abstract

Digital subscriber line (DSL) technology uses the existing unshielded twisted-pair

(UTP) telephone lines to offer high-speed data transmission to and from customer

premises. The crosstalk among the twisted pairs in the same or neighboring bundles

in a cable is a major impairment in the current DSL systems. It is invaluable for a

service operator to obtain the crosstalk transfer functions because this information

can be used to facilitate the provisioning, maintenance, and diagnosis of the DSL

systems, and to signiÞcantly improve the DSL systems� performance (e.g., the data

rate and the line reach).

This dissertation proposes a novel idea of an impartial network maintenance

center that identiÞes the crosstalk coupling functions among the twisted pairs in

these DSL systems. The crosstalk identiÞcation technique includes the following four

major procedures: 1) the transmitted and received signals from each DSL modem for

a pre-deÞned time period are collected and sent to the network maintenance center;

2) the signals are resampled according to the clock rate of the receiver of interest;

3) the signals� timing differences are estimated by cross-correlation; 4) the crosstalk

coupling functions are estimated using the least-squares method. The performance of

the cross-correlation and least-squares methods is analyzed to determine the amount

of data needed for identiÞcation. Simulation results show that the proposed methods

can identify the crosstalk functions accurately and are consistent with theoretical

analysis.

Near-end crosstalk (NEXT) from other types of systems (such as HDSL, SDSL,

T1, etc) is the major impairment to current asymmetric DSL (ADSL) downstream

transmission. This dissertation presents two methods for an ADSL receiver to cancel

iv

Page 5: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

one (dominant) NEXT signal. The methods exploit the fact that the crosstalk signal

has a large excess bandwidth and its spectra in the main lobe and in the excess band

are strongly correlated. The principal idea is then to estimate the crosstalk in some

frequency bands (e.g., excess band) and cancel it in other frequency bands (e.g., main

lobe). In order to select the right frequency bands to observe the crosstalk signal,

a frequency-domain analysis is taken to provide guidance, as well as an intuitive

explanation of the crosstalk estimation and cancellation. Moreover, a fast algorithm

is proposed for practical implementation. Simulation results show that one of the

proposed methods, MMSE estimation and cancellation, is very effective to cancel one

(dominant) NEXT and the improvement is signiÞcant in terms of the data rate and

the line reach for the ADSL service. For example, using an actual measured NEXT

transfer function, the proposed method can increase the ADSL downstream data rate

by 200% for some loops.

This dissertation also includes three multiuser water-Þlling algorithms for a

Gaussian multiaccess channel with intersymbol interference. These algorithms ef-

Þciently compute the optimal transmit power spectral density (PSD) for each user

and obtain the capacity region for a two-user channel.

v

Page 6: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Acknowledgements

It is a joyful moment for me to write these acknowledgements because Þnally there is

an official place to say �thank you� to many people I am indebted to.

I am extremely grateful to Professor John M. Cioffi because he gives me this

opportunity to study and do research in his group. John provides me extraordinary

help and advice, some of which come from ordinary conversation and group meetings.

John had a lot of conÞdence and faith in me. When I just joined the group, he asked

me to participate the standard contributions to ANSI, ETSI, ITU committees. The

work expedites my understanding of DSL technology and its future direction. Last

year, John let me work on a large research project of characterizing the crosstalk

environment in DSL systems, which laid the foundation of my thesis. During the

course, John always gave enthusiastic encouragement on my small progress and offered

insightful comments on the technical problems. Despite his tight schedule, he always

managed to respond to my difficulty by email or talking to me directly. I particularly

look up to his spirit of diligence, humbleness, amiableness, entrepreneurship, and so

on.

I would like to thank Dr. Ken Kerpez from Telcordia Inc., which supports my

research project. Ken encouraged me to look into the problem of DSL crosstalk

cancellation, which now becomes part of my thesis. He is a reading committee member

of my thesis and provides me very constructive and rigorous comments.

I would also like to thank my second reader, Professor John T. Gill III. Professor

Gill is a guru of LATEX. His numerous suggestions on the LATEX style and comments

on the thesis content greatly improve this dissertation.

vi

Page 7: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Along my graduate study, many professors gave me Þnancial support and aca-

demic advice. Professor Milan Sonka from University of Iowa supported me during

my Þrst year in USA. Professor Yuval Shahar in Stanford Medical Informatics De-

partment helped me come to Stanford University for my graduate study in Electrical

Engineering. Professor Edward J. McCluskey had kindly supported me for two years

to obtain my Master of Science degree in Stanford. Without them, I would never be

able to Þnish my Ph.D. degree in Stanford by now.

My group members are like a new family to me in USA. These talented people

are so ready to offer help on both research and everyday life. Besides the research, we

had a lot of fun by having many sports (skiing, basketball, soccer, volleyball, bowling,

etc.), monthly birthday party, everyday�s coffee break, and every hour�s joking break.

My thanks go to Joice Debolt, Carlos Aldana, Louise Hoo, Kok-Wui Cheong, Won-

Joon Choi, Wei Yu, George Ginis, Wonjong Rhee, Jeannie Lee Fang, Atul Salvekar,

Ghazi A Al-rawi, Dimitrios-Alexandros Toumpakaris, Avneesh Agarwal, Jungwon

Lee, Amal Ekbal, Kee-Bong Song, Nick Wu, Susan Lin, Ardavan Maleki-Tehrani,

John Fan, Joonsuk Kim, Jose Tellado-Mourelo, Joseph Paul Lauer. Especially, I

would like to express my appreciation to Carlos for his unselÞsh devotion to maintain

our computer systems. The visiting scholars in our group are also very resourceful, I

would especially like to thank Dr. Elisabeth De Carvalho for her discussion.

I would like to thank my family in China for their tremendous support. By

talking to them, I�ve always been very optimistic about the future. This thesis is also

to commemorate my father, who unfortunately passed away several years ago and

can only share the joyful moment in a different world. Finally but most importantly,

I would like to thank my wife - Dan Li. Without her, it is absolutely impossible for

me to Þnish my thesis!

Chaohuang Zeng

July, 2001

vii

Page 8: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

viii

Page 9: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Contents

Abstract iv

Acknowledgements vi

1 Introduction 1

1.1 DSL Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.1.1 Telephone Loop Structure . . . . . . . . . . . . . . . . . . . . 2

1.1.2 Generic DSL Model . . . . . . . . . . . . . . . . . . . . . . . . 4

1.1.3 Types of DSLs . . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.2 Noise Environment for DSL Systems . . . . . . . . . . . . . . . . . . 7

1.2.1 Crosstalk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

1.2.2 Radio Frequency Interference (RFI) . . . . . . . . . . . . . . . 11

1.2.3 Impulse Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

1.3 Systems Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

1.3.1 Unbundling Process . . . . . . . . . . . . . . . . . . . . . . . . 12

1.3.2 Spectral Compatibility . . . . . . . . . . . . . . . . . . . . . . 13

1.3.3 Maintenance, Diagnosis, and Provisioning . . . . . . . . . . . 14

1.4 Outline of Dissertation . . . . . . . . . . . . . . . . . . . . . . . . . . 14

1.4.1 Crosstalk IdentiÞcation . . . . . . . . . . . . . . . . . . . . . . 15

1.4.2 Crosstalk Cancellation . . . . . . . . . . . . . . . . . . . . . . 16

1.4.3 Multiuser Water-Þlling Algorithms . . . . . . . . . . . . . . . 17

1.5 Research Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . 18

ix

Page 10: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2 Crosstalk IdentiÞcation 20

2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2.2 Impartial Network Maintenance Center (NMC) . . . . . . . . . . . . 22

2.3 Crosstalk IdentiÞcation . . . . . . . . . . . . . . . . . . . . . . . . . . 25

2.3.1 Timing Difference Estimation . . . . . . . . . . . . . . . . . . 26

2.3.2 Crosstalk Functions Estimation . . . . . . . . . . . . . . . . . 28

2.3.3 Resampling for Different Services . . . . . . . . . . . . . . . . 34

2.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

2.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

3 Crosstalk Cancellation 44

3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

3.2 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

3.3 Crosstalk Cancellation . . . . . . . . . . . . . . . . . . . . . . . . . . 50

3.3.1 Crosstalk Signal Estimation and Cancellation . . . . . . . . . 50

3.3.2 Geometrical Interpretation and Tone Selection . . . . . . . . . 52

3.3.3 Fast Computation . . . . . . . . . . . . . . . . . . . . . . . . . 58

3.3.4 Extension to Multiple Crosstalkers . . . . . . . . . . . . . . . 60

3.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

3.4.1 HDSL NEXT Cancellation . . . . . . . . . . . . . . . . . . . . 63

3.4.2 SDSL NEXT Cancellation . . . . . . . . . . . . . . . . . . . . 66

3.4.3 Fast Computation . . . . . . . . . . . . . . . . . . . . . . . . . 67

3.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

4 Multiuser Water-Þlling Algorithms 72

4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

4.2 Prerequisite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

4.3 Multiuser Water-Þlling Algorithms . . . . . . . . . . . . . . . . . . . 78

4.3.1 Equal Priority : max(R1 +R2) . . . . . . . . . . . . . . . . . 79

4.3.2 K Users : max(R1 +R2 + · · ·+RK) . . . . . . . . . . . . . . . 82

4.3.3 Unequal Priority : max(αR1 + (1− α)R2) . . . . . . . . . . . 88

4.3.4 Comments on Further Research . . . . . . . . . . . . . . . . . 93

x

Page 11: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.4 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

4.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

5 Conclusions 98

5.1 Crosstalk IdentiÞcations . . . . . . . . . . . . . . . . . . . . . . . . . 99

5.2 Crosstalk Cancellation . . . . . . . . . . . . . . . . . . . . . . . . . . 100

5.3 Multiuser Water-Þlling Algorithms . . . . . . . . . . . . . . . . . . . 101

A Proof of Equation (2.7) 102

Bibliography 104

xi

Page 12: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

List of Tables

2.1 DSL Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

3.1 Main ADSL and HDSL Characteristics. . . . . . . . . . . . . . . . . 61

3.2 ADSL system parameters for data rate calculation. . . . . . . . . . . 63

4.1 Three-user channels loading process. . . . . . . . . . . . . . . . . . . 95

4.2 Two-user channel with unequal priority. . . . . . . . . . . . . . . . . 95

xii

Page 13: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

List of Figures

1.1 Telephone loop structure. . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.2 Generic DSL reference model. . . . . . . . . . . . . . . . . . . . . . . 3

1.3 ADSL FDD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

1.4 VDSL FDD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

1.5 Illustration of NEXT and FEXT. . . . . . . . . . . . . . . . . . . . . 8

1.6 NEXTs in two different loop topologies. . . . . . . . . . . . . . . . . . 9

1.7 FEXTs in three different loop topologies. . . . . . . . . . . . . . . . . 10

1.8 Coexistence of ILEC and CLEC. . . . . . . . . . . . . . . . . . . . . 13

2.1 Network model of DSL systems for one receiver. . . . . . . . . . . . . 23

2.2 Timing offset between the transmitted signals and the received signals.

Lt is the length of the pre-deÞned observation time span. . . . . . . . 24

2.3 A baseband crosstalk model. . . . . . . . . . . . . . . . . . . . . . . . 34

2.4 NEXT from HDSL and ISDN. Each curve represents only one crosstalker. 38

2.5 FEXT from ADSL, ISDN, and HDSL. Each curve represents only one

crosstalker. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

2.6 Absolute cross-correlation value between the received signal and the

HDSL transmitted signal. . . . . . . . . . . . . . . . . . . . . . . . . 40

2.7 HDSL NEXT time response and its estimate. . . . . . . . . . . . . . 41

2.8 The sum of the squared crosstalk estimation error. . . . . . . . . . . . 42

3.1 The primary and crosstalk channel model. . . . . . . . . . . . . . . . 47

3.2 Crosstalk estimation and cancellation. . . . . . . . . . . . . . . . . . 53

3.3 Measured NEXT coupling for a given line. . . . . . . . . . . . . . . . 62

xiii

Page 14: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.4 HDSL NEXT estimation and cancellation. . . . . . . . . . . . . . . . 64

3.5 Downstream data rates with/without NEXT cancellation. . . . . . . . 65

3.6 SDSL NEXT estimation and cancellation. . . . . . . . . . . . . . . . 66

3.7 Downstream data rates with/without SDSL NEXT cancellation. . . . 68

3.8 HDSL NEXT cancellation using the fast algorithm. . . . . . . . . . . 69

3.9 SDSL NEXT cancellation using the fast algorithm. . . . . . . . . . . 70

4.1 Two-user Gaussian multiaccess channel. . . . . . . . . . . . . . . . . 73

4.2 Water-Þlling diagram for a single user channel. . . . . . . . . . . . . . 74

4.3 Water-Þlling diagram for two users with equal priorities. . . . . . . . 76

4.4 Water-Þlling diagram for two users with different priorities (α > 0.5). 77

4.5 Two curves representing functions g1(i)/g2(i) and b1(i)/b2(i), respec-

tively. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

4.6 Water-Þlling diagram for three users. . . . . . . . . . . . . . . . . . . 84

4.7 Two curves for f = 0 and g = 0. Binary search is used in both b1 and

b2 axes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

4.8 The capacity region of the two-user Gaussian multiaccess channel. . . 96

xiv

Page 15: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Chapter 1

Introduction

The last four decades have witnessed a dramatic improvement of transmission speed

over the ancient telephone wires, from 300 bit/s in one of the Þrst modems, AT&T�s

Bell 103, to 6 Mbit/s in some current DSL modems. The data rate is projected to

reach 52 Mbit/s when the very-high-bit-rate DSL (VDSL) service is deployed. In the

Þrst three decades (1955-1990), the modem was primarily designed to transmit data

over the voice band whose bandwidth is about 4 kHz. The data rate improvement

then relied heavily on the advance of equalization and coding techniques. In the

last decade, the DSL modems are designed to increase the data rate from a different

perspective, i.e., by using a much wider bandwidth. For example, ADSL and VDSL

have bandwidth of 1.104MHz and 17.664MHz, respectively. The wider bandwidth is

the fundamental driving factor that enables DSL to transmit more than 100 times of

data rate than the best voice-band modem (56 kbit/s, V.90 [1]). Unfortunately, there

is one major impairment associated with the wider bandwidth used by DSL systems.

That is the severe crosstalk among the telephone wires in the same or neighboring

bundles. This dissertation describes a method to identify the crosstalk environment

in individual DSL systems. The crosstalk information is extremely useful for service

operators to maintain and expand the DSL systems. Based on the estimated crosstalk

transfer function, this dissertation presents two methods to cancel or mitigate the

impact of one dominant crosstalker on ADSL services.

1

Page 16: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2 CHAPTER 1. INTRODUCTION

MDF

Central Office

SAI

Equipment

Feeder Distribution

CustomerPremises

Drop Wire

Pedestal

MDF: Main Distributing FrameSAI : Service Area Interface

Figure 1.1: Telephone loop structure.

1.1 DSL Systems

This section Þrst describes a typical telephone loop structure between the central

office (CO) and the customer premises. Then a generic DSL model and different

types of DSL services are described. In particular, ADSL and VDSL are described

in more detail because ADSL is the most widely deployed DSL service so far, and

VDSL is an extension of ADSL to much higher data rates.

1.1.1 Telephone Loop Structure

Figure 1.1, which is simpliÞed from [2, Figure 3.1], shows the typical telephone loop

structure. The main distributing frame (MDF) in the central office is a large wire

cross-connect frame that can connect any port of the equipment to the feeder cables as

shown in Figure 1.1. The feeder cable, known also as E-side or F1 plant, contains up

to 10000 unshielded twisted pairs (UTPs) of wires. These feeder cables are terminated

Page 17: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.1. DSL SYSTEMS 3

CO/NGDLC/ONU

LT

LT

LT

Customers

NT TESwitch or

Multiplexor

repeater

ONU: Optical Network UnitLT : Line TerminationNT : Network TerminationTE : Terminal Equipment

Local LoopTrunk

Figure 1.2: Generic DSL reference model.

in the service area interface (SAI), which is typically about 3000 feet away from the

customer premises and serves on the order of 3000 living units. SAI also contains a

wire cross-connect device which connects any incoming wire to the distribution cable.

The distribution cable, known also as D-side, contains up to 1000 UTPs. Both feeder

cables and distribution cables are bundled into binder groups of 25, 50, or 100 pairs.

The UTPs in distribution cables connect to the drop wires via a pedestal device that

is also known as a distribution terminal. The drop wires then connect to the wires

inside the house via a network interface device (NID).

To reduce the number of wires in the feeder cables, digital loop carrier (DLC)

was used in the SAI to multiplex many different lines in the distribution cable to a

few T1-carrier feeder lines to the CO. The next-generation DLC (NGDLC) uses Þber

to connect the CO to the SAI, which serves up to 3, 000 customers.

Page 18: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4 CHAPTER 1. INTRODUCTION

1.1.2 Generic DSL Model

The generic DSL reference model is shown in Figure 1.2. LT is the DSL modem

at the operator end of the local loop; NT is the DSL modem at the customer end

of the local loop. TE is the user�s device, such as personal computer, fax machine,

telephone, etc. The repeater is a signal regeneration device that is located near the

midpoint of the telephone line. Most lines do not need repeaters. The local loop is

the twisted pair copper wires that connect the CO and the customer premises. The

switch or the multiplexor in the CO is used to interface between the LT�s modems

and the Þber in the trunk which connects to the outside network. The ONU (optical

network unit) is used with the VDSL service, where the loop starts from the ONU

instead of the CO because a short loop (less than about 3000 feet) is required.

1.1.3 Types of DSLs

At the time of writing, the DSL family includes ISDN (integrated services digital net-

work), HDSL (High-bit-rate DSL ), HDSL2 (second-generation HDSL), SDSL (single-

pair, symmetric DSL), SHDSL (single-pair, high-speed DSL), ADSL, and VDSL.

Of these DSLs, ISDN, ADSL, and HDSL have been standardized by International

Telecommunication Union (ITU). ITU-T Recommendation G.995.1 [3] provides a

comprehensive overview of ADSL and HDSL recommendations. HDSL2, SHDSL,

and VDSL are currently in the process of being standardized. SDSL is not stan-

dardized but has been deployed at various bit rate up to 2.32 Mbit/s. Some basic

characteristics of the different DSL services are listed in the following.

� ISDN. Basic rate ISDN (BRI) was originally envisioned to provide a uniformglobal network for telephony and data communication. It offers 160 kbit/s

bidirectional data transmission using 80 kHz bandwidth. The simple 2B1Q,

4 level PAM, baseband transmission with echo cancellation is used. There are

three variant systems in different countries as speciÞed in the appendices of ITU

Recommendation G.961 [4].

� HDSL. Three systems are speciÞed in the ITU-T recommendation G.961 [5].

Page 19: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.1. DSL SYSTEMS 5

The Þrst system uses two or three wire pairs in parallel; each pair transports

bidirectionally a bit rate of 784 kbit/s. The second system uses only two pairs

in parallel; each pair transports bidirectionally a bit rate of 1168 kbit/s. The

third system uses only one pair with an increased bit rate of 2320 kbit/s bidi-

rectionally. The line codes for all the systems are either 2B1Q or carrierless

amplitude/phase (CAP) modulation [6]. The CAP modulation has a single car-

rier and is similar to the quadrature amplitude modulation (QAM). In north

America, 2B1Q HDSL with data rate of 784 kbit/s in each pair is universal.

� HDSL2 is a full duplex system and uses one twisted pair to offer a payload of

1.544 Mb/s. Compared to the HDSL one-pair system, it uses less bandwidth

but with a cost of very sophisticated trellis precoding technique [7].

� SDSL is not standardized but has been deployed. It uses one twisted pair tooffer various symmetric data rates up to 2.32 Mbit/s. The line code is 2B1Q.

Its advantages over HDSL and HDSL2 are variable data rates, lower cost, and

greater range.

� SHDSL uses 16-level pulse amplitude modulation (PAM) with trellis codes [8].Like SDSL, it offers various symmetric bit rates ranging from 300 kbit/s to 2.32

Mbit/s, depending on the loop length. SHDSL is more spectrally compatible

with other DSL systems because of its sharp rolloff in the excess band. Its draft

standard is waiting for approval [9].

� ADSL uses one pair to offer the asymmetric data transmission between thecustomer premises and the CO. The upstream and downstream data rates

are up to 640 kbit/s and 6 Mbit/s, respectively, within a service radius of

approximately 12 kft from the CO, and 176 kbit/s and 1.544 Mbit/s within the

radius of approximately 18 kft. ADSL allows simultaneous transmission of the

voice-band signal because it uses the frequency above the voice band. The line

code is discrete multitone transmission (DMT) [10][11], which is an effective

realization of multicarrier transmission [12][13]. Frequency division duplexing

(FDD) is used in most systems. ADSL FDD is shown in Figure 1.3.

Page 20: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

6 CHAPTER 1. INTRODUCTION

Up Downstream

25.6 138 1104

FrequencykHz

Figure 1.3: ADSL FDD.

Downstream

0.138 3.75

FrequencyMHz

PSD

Upstream

5.2

Downstream

8.5

Upstream

12

Figure 1.4: VDSL FDD.

� VDSL is an extension of ADSL technology. It offers much higher data rate thanADSL on a shorter loop by using much wider bandwidth. The shorter loop

can be achieved by connecting the customer premises to an ONU instead of

the CO. The downstream bit rate ranges from 13 Mbit/s to 52 Mbit/s. The

upstream ranges from 1.6 Mbit/s to 26 Mbit/s. There are two trial standards

[14]. One standard uses DMT as the line code [15], while the other uses CAP

as the line code [16]. The FDD scheme shown in Figure 1.4 is recommended for

VDSL. The second upstream band can be extended to 30 MHz, depending on

the implementation.

In summary, ISDN, HDSL, HDSL2, SDSL, and SHDSL offer symmetrical full-

duplex data rates and use separate pairs from the plain old telephone service (POTS).

In contrast, ADSL and VDSL offer asymmetrical 1 data rates and coexist with POTS

by using FDD.1VDSL also supports symmetric data transmission.

Page 21: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.2. NOISE ENVIRONMENT FOR DSL SYSTEMS 7

This summary of services is not complete without mentioning two other existing

legacy systems, T1 and E1, although they are not classiÞed into the DSL family by

some authors [2].

� T1 was originally designed for transmission between central offices in the UnitedStates in the early 1960s. Today the CO-to-CO connection is almost entirely

replaced by Þber and microwave. Since the early 1970s, T1 had also been

installed to connect the CO to the SAI, or to the customers in a local loop. It

uses dual simplex on two twisted pairs to offer 1.544 Mbit/s data rate in each

direction. To reduce the crosstalk between lines, the two pairs are kept in two

different binder groups, one of which transmits data in the upstream direction

and another transmits in the downstream direction. Additionally, T1 lines are

kept in separate binder groups from the DSL lines. T1 will be succeeded by

DSL services (e.g., HDSL2, SDSL) because T1 is more expensive. However,

many existing T1 lines are unlikely to be replaced by DSL services.

� E1 is similar to T1, but has a higher data rate of 2.048 Mbit/s for 32 voicechannels. It is used in Europe.

1.2 Noise Environment for DSL Systems

The UTP was originally designed to transport the voice signal. Its balance [17] is

best in the POTS band. Unfortunately, the balance worsens at the higher frequencies

that DSL systems use. The imbalance of the UTP induces it to pick up detrimental

differential signals from other sources. These undesirable coupled signals include

crosstalk, radio signal interference (RFI), and impulse noise.

1.2.1 Crosstalk

Crosstalk noise is due to the capacitive and inductive coupling from the signals in

other UTPs. Two commonly encountered types are near-end crosstalk (NEXT) and

far-end crosstalk (FEXT) as shown in Figure 1.5. NEXT is the sum of those crosstalk

Page 22: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

8 CHAPTER 1. INTRODUCTION

Pair i

Pair j

NEXT FEXT

Figure 1.5: Illustration of NEXT and FEXT.

signals that travel in the opposite direction to the interfering signal. Intuitively

as in the Þgure, the interfering transmitter is in the �near end� of the interfered

receiver. Conversely, FEXT is the sum of those crosstalk signals that travel in the

same direction as the interfering signal and the interfered receiver is in the �far end�.

In general, FEXT is much smaller than NEXT in DSL systems because FEXT is

attenuated as it travels along the line. In ADSL and VDSL systems, FDD is used to

avoid NEXT from the same type of services. However, NEXT still exists in ADSL and

VDSL systems from other types of services like HDSL, SDSL, T1, and etc, because

they overlap in frequency.

Variant forms of NEXT and FEXT arise in real systems, depending on the topol-

ogy of the loop structure. Figure 1.6(a) shows NEXT in the customer side (NT) and

in the CO. NEXT in the NT is attenuated because the customer premises are in

separate locations. However, this attenuation is usually small because the length

difference in the same binder group is small. Figure 1.6(b) shows NEXT from a re-

peater of T1 or other services. The level of the crosstalk depends on the location of

the repeater. If it is close to the premises, the impact is sometimes disastrous on the

victim DSL system. This dissertation proposes two methods to cancel or mitigate

such strong crosstalk.

Figure 1.7(a-b) shows the unequal FEXT between two pairs because these two

pairs have different length. Unequal FEXT is not an issue for most DSL systems

because their noise is dominated by NEXT. However, it is a major problem for

VDSL because FEXT is the dominant crosstalk in VDSL systems beyond 1 MHz.

The FEXT induced by a shorter loop (e.g., 1000 ft) could be larger than the primary

Page 23: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.2. NOISE ENVIRONMENT FOR DSL SYSTEMS 9

CO

NT

NT

(a)

LT

LT

NEXT

CO

NT

NT

(b)

LT

LT

NEXT

T1/HDSL Repeater

Figure 1.6: NEXTs in two different loop topologies.

VDSL signal in the longer loop (e.g., 3000 ft), which makes it impossible for the longer

loop to transport the required data rate. This is similar to the �near-far� problem

in the wireless Þeld. Power back-off (PBO) methods [18] are used to mitigate the

problem by transmitting less power on the shorter loop. With the knowledge of the

FEXT transfer function, Yu [19] recently proposed a new PBO method that performs

much better than previous methods that rely solely on FEXT models.

Figure 1.7(c) shows the FEXT from a T1/HDSL repeater. The FEXT here can

have a catastrophic effect on the victim DSL service if the repeater is close to the

victim transceiver.

A vast number of measurements of crosstalk were taken in the 1970s and 1980s to

obtain statistical information about the crosstalk [20]. In DSL systems, the commonly

adopted crosstalk models for NEXT and FEXT are, respectively,

|HNEXT (f)|2 ≈ 10−14f3/2

Page 24: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

10 CHAPTER 1. INTRODUCTION

CO

NT

NT

(c)

LT

LT

FEXT

T1/HDSL Repeater

CO

NT

NT

(a)

LT

LTFEXT

CO NT

NT

(b)

LT

LT

FEXT

ONU

Figure 1.7: FEXTs in three different loop topologies.

Page 25: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.2. NOISE ENVIRONMENT FOR DSL SYSTEMS 11

and

|HFEXT (f)|2 ≈ |Hchannel(f)|2 × 10−20f2l,

where l is the loop length in meters and Hchannel is the loop channel response. These

models conform very well with the 1% worst-case rule, which means the value from

the models is worse than 99% of the actual UTPs environment [21]. These models

are also veriÞed independently by the data from Bellcore Inc. [22]. The current DSL

design and test procedures are all based on these models. However, the models are

too pessimistic for most real scenarios. It would be much better for the DSL systems

to adapt to the individual crosstalk environment. This requires the actual knowledge

of the crosstalk coupling functions, which can be obtained by the method proposed

in this dissertation.

It is worthwhile to clarify some terminology. Self-FEXT to a pair refers to the

FEXT from other pairs with the same types of service. The name is somewhat

misleading because it seems to suggest that the FEXT comes from itself. In fact,

Bingham [23] suggests to use the term of kindred-FEXT. Likewise for self-NEXT.

In this dissertation, the terms of self-FEXT and self-NEXT are used in order to be

consistent with the terminology used in most standard recommendations, even though

they are not precise. Alien-FEXT to a pair refers to the FEXT from other pairs with

different types of services. For example, HDSL FEXT is an alien-FEXT to an ADSL

service. Likewise for alien-NEXT.

1.2.2 Radio Frequency Interference (RFI)

The twisted-pair telephone lines, especially the aerial segment such as the drop wires,

can act like antennae. Because of the line imbalance, DSL receivers will sense the

external RFI, known as ingress. The ingress model is studied in [24]. Conversely,

the imbalanced lines can emit DSL signals unequally that cause interference to the

external RF receiver, known as egress. AM radio and amateur radio (�HAM�)

are two common RF sources that overlap frequency with DSL systems. AM radio

operates in the frequencies ranging from 560 kHz to 1.6MHz. The AMRFI can impact

many of the DSL services. The ingress level could be larger than the crosstalk level,

Page 26: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

12 CHAPTER 1. INTRODUCTION

therefore it can not be ignored by the designer. HAM radio operates in the frequency

above 1.8 MHz and generally affects only VDSL systems. The HAM transceiver

has large transmit power and may be close to the VDSL transceiver. Therefore, it

could saturate the analog front ends of VDSL receivers. Several methods [25][26] are

proposed to cancel the HAM RFI.

1.2.3 Impulse Noise

Impulse noise is short-term nonstationary interference from varied sources, for ex-

ample, lighting strikes, power lines, switching transients of machinery, arc welders,

and so on. There is no standard model for impulse noise because of its diverse na-

ture. A widely used model is the Cook pulse model [27], proposed by John Cook of

British Telecom. DSL systems generally have 6 dB design margin to partially avert

the problem caused by impulse noise.

1.3 Systems Management

Many types of DSL systems coexist in the same cable. They cause interference to

each other, especially in the same binder group. It is in the best interest of service

operators to be able to manage the systems economically, such that a maximum num-

ber of services can be deployed without compromising the reliability and availability

of the services. System management mainly includes spectral compatibility between

different systems, diagnosis of the system when it breaks down, and provisioning of

new services. To better manage the system, the crosstalk functions among the pairs

need to be identiÞed, which is one of the topics in this dissertation.

1.3.1 Unbundling Process

The local telephone infrastructure belongs to the incumbent local exchanger carrier

(ILEC), which is the traditional local phone company. To stimulate competition, the

regulators in many countries force the ILECs to open their infrastructure to other

service providers, which are known as competitive local exchangers carrier (CLECs).

Page 27: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.3. SYSTEMS MANAGEMENT 13

ILEC DSLAM

CLEC DSLAM

CO

Customer

CustomerUTP cable

DSLAM: DSL access multiplexor

Figure 1.8: Coexistence of ILEC and CLEC.

As a result, many operators can offer different DSL services through the pairs in

the same binder group, which makes system management even more complicated.

There is an excellent article [28] that describes the background and the impact of the

unbundling process.

CLECs can lease part of the CO and place their equipment there. Figure 1.8

shows one possible conÞguration of the coexistence of the ILEC and CLEC services.

Because the space in the CO may be unavailable or too expensive, CLECs can also

choose to put their equipment close to the CO and connect them to COwith dedicated

lines.

1.3.2 Spectral Compatibility

To ensure that all DSL systems work together, the crosstalk level generated by dif-

ferent DSL systems must be limited. This is done currently by controlling the power

spectral density (PSD) of the transmitted signals from different services. The common

practice is that a new service should not be more invasive than any existing service

would be to itself. In the DSL family, newly deployed services generally have wider

bandwidth but with lower PSDs. There is a draft standard for spectral management

[29] that speciÞes the PSDs of different systems.

Page 28: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

14 CHAPTER 1. INTRODUCTION

All these speciÞcations on spectral compatibility rely on 1% worst-case crosstalk

models, which do not necessarily reßect the individual scenario in different loop plants.

Besides, it is very difficult to enforce both ILEC and CLEC operators to comply to the

standard if it is not mandated by the Federal Communications Commission (FCC).

This dissertation proposes a novel idea that an impartial third-party is established to

identify real crosstalk functions and monitor the PSDs from the modems belonging

to the same or different operators.

1.3.3 Maintenance, Diagnosis, and Provisioning

Maintenance of DSL systems is much more costly than the equipment itself. ITU

creates a special telecommunication management network model (TMN) to facilitate

the management of telecommunications networks. Interested readers are referred

to ITU-T recommendation M.3000 [30] for the overview of TMN recommendations.

Nonetheless, in the current stage it is very difficult to diagnose the systems if one DSL

service breaks down, since the real crosstalk environment around the disrupted line

is unknown. This dissertation presents techniques that solve this diagnosis problem

by determining which lines are the dominant crosstalkers to the disrupted line.

For the operators (ILEC and CLEC), more subscribers imply more revenue.

Unfortunately, not all UTPs are qualiÞed for DSL services. It is very important for

the operators to know which lines are available for provisioning the requested services

and for the future deployments. By knowing the crosstalk environments and the line

characteristics, the operators increase the probability of making the right provisioning

decision without the high expense of sending technicians to the Þeld.

1.4 Outline of Dissertation

Chapter 1 brießy introduced different types of DSL systems, the hostile noise envi-

ronments for DSL systems, and the management aspect of DSL systems. For service

operators, system management is in fact a very challenging task, because the wires in

the same binder group can carry different DSL services (e.g., HDSL, SDSL, ADSL,

Page 29: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.4. OUTLINE OF DISSERTATION 15

etc.) that may belong to different service operators (ILEC and CLEC). Currently,

DSL deployment relies almost entirely on the assumed 1% worst-case noise models.

The models, however, are far from the real crosstalk environments encountered in a

particular system. Therefore, the real crosstalk environments need to be identiÞed for

better system management. With the knowledge of the crosstalk transfer function,

the detrimental impact of the crosstalk can be also cancelled or mitigated. These

subjects comprise the main theme of this dissertation. The knowledge of crosstalk

transfer functions can also be utilized to control the transmit PSD [31] of different

modems dynamically to improve the overall systems� performance, like the power

back-off method in VDSL systems.

1.4.1 Crosstalk IdentiÞcation

Chapter 2 describes a method to identify the crosstalk transfer function between

different UTPs. With heterogenous DSL systems, the modems of different services

have different sampling rates, which implies that crosstalk functions from different

services are not stationary for a particular DSL receiver. Furthermore, these modems

can belong to different service operators. Without any cooperation between operators,

it is very difficult, if not impossible, to exactly identify the crosstalk transfer function

between the lines belonging to different service operators.

This dissertation brings a novel concept of an impartial central network mainte-

nance center (NMC) that identiÞes the crosstalk functions for all participated oper-

ators and feeds back the identiÞed crosstalk functions to them. The NMC captures

the transmitted and received data from each DSL modem for a pre-deÞned time span.

Essentially, the NMC has the knowledge of both the input and the output data from

different modems, which makes the identiÞcation easier. Unfortunately, since the

DSL modems are not synchronized, the time stamps associated with the data from

different modems have timing offset up to several milliseconds. In other words, the

input data and the output data are not strictly aligned together in time. This timing

offset problem is solved here by a cross-correlation technique that crosscorrelates the

input data and the output data and seeks for a peak.

Page 30: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

16 CHAPTER 1. INTRODUCTION

The process of the crosstalk identiÞcation for a particular receiver is summarized

in the following four steps:

1. An NMC captures the data from different modems for a pre-deÞned time dura-

tion;

2. Resample the input data according to the clock rate of the receiver;

3. Align the input and the output data using a cross-correlation technique. The

cross-correlation technique can also identify the dominant crosstalkers for a

given line.

4. Estimate the crosstalk function using the least-squares method.

Note that, if there is only one operator, the NMC most likely belongs to the

operator.

1.4.2 Crosstalk Cancellation

Chapter 3 describes two methods to cancel or mitigate one (dominant) crosstalker

into ADSL downstream transmission. The downstream receiver is more vulnerable

than the upstream to crosstalk because the signal is severely attenuated at the higher

frequencies. ADSL service is the most widely deployed DSL service. Currently it has

several millions of subscribers, and the number is expected to double in the next two

years. Crosstalk from HDSL, HDSL2, SDSL, T1, and their repeaters can disrupt an

ADSL downstream service. Mitigating crosstalk can increase the ADSL downstream

data rate and/or the line reach (i.e., the customer coverage area).

The methods proposed here exploit the fact that crosstalk has a large excess

bandwidth and its spectrum is strongly correlated between the main lobe and the

excess band. The crosstalk signal can be estimated in some frequency bands (e.g.,

excess band) and cancelled in other bands (main lobe). The two methods are :

1. Decision-aided cancellation. The crosstalk signal is estimated in some frequency

bands and then decoded according to the constellation of the crosstalk signal

Page 31: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.4. OUTLINE OF DISSERTATION 17

(such as 2B1Q). This method has the disadvantage of error propagation, because

the decision error can worsen the negative impact on the residual error.

2. Minimum-mean-squares-error (MMSE) estimation and cancellation. The crosstalk

signal is estimated in some bands by the MMSE method, and the estimated

value is directly used to cancel the crosstalk without decoding. The method is

extended to cancel multiple crosstalkers.

This dissertation also provides a guidance on how to select the right frequency

bands to observe the crosstalk signal and an intuitive explanation of the crosstalk

cancellation process. The analysis on the residual error by the MMSE method reveals

two most interesting results. If the crosstalk signal is estimated in the main lobe, the

crosstalk in the excess band can be virtually eliminated. However, if the crosstalk

signal is estimated in the excess band, the signal to interference and noise ratio (SINR)

improvement in the main lobe is approximately equal to the crosstalk signal to noise

ratio in the excess band.

A fast algorithm is then proposed for practical implementation, with relatively

small degradation of system performance. This algorithm avoids large matrix in-

version and multiplication in each transmission block, which is typical for MMSE

estimation.

1.4.3 Multiuser Water-Þlling Algorithms

Chapter 4 detours from the crosstalk identiÞcation and cancellation problems to the

spectrum optimization problem for a Gaussian multiaccess channel (MAC). This

chapter is not strongly related to DSL systems and thus can be considered as a stand-

alone portion of this thesis. The mathematical expression for the optimum PSDs for

a Gaussian MAC with intersymbol interference (ISI) has been known for about two

decades. This chapter describes some practical algorithms that calculate the opti-

mum PSDs with low computational complexity. The Þrst algorithm is proposed for

a two-user channel with equal priorities. The second algorithm is an extension of the

Þrst algorithm and calculates the PSDs for K (K > 2) users with equal priorities.

The last algorithm is again for a two-user channel but with different user priorities,

Page 32: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

18 CHAPTER 1. INTRODUCTION

which can be used to obtain the capacity region. These algorithms have the potential

to be used for adjusting the transmit PSDs for a Gaussian MAC with ISI.

1.5 Research Contributions

The main theme of this dissertation is crosstalk identiÞcation and cancellation in DSL

systems. This dissertation also includes a topic on PSD optimization for different

users in a Gaussian MAC with ISI. To summarize, my research contributions towards

my Ph.D. degree include:

1. We are the Þrst to propose a concept of an impartial network maintenance center

(NMC) and a method that identiÞes the crosstalk functions among the twisted

pairs of wires in the DSL systems. This method includes data capturing via

an NMC, resampling for different services, data alignment via cross-correlation,

and the crosstalk function estimation through the least-squares method. The

information about the crosstalk functions can be utilized in many aspects. Ap-

plication examples include ensuring spectral compatibility of different systems,

system diagnosis and provisioning, and improvement of the overall systems�

performance by dynamic spectral management (e.g., power back off methods in

VDSL systems) or multiuser detection. This work is to appear in [32].

2. We are the Þrst to propose the two methods here for cancellation or mitigation

of one dominant crosstalker into an ADSL downstream receiver. The methods

estimate the crosstalk signal in some frequency bands and cancel it in other

frequency bands. This is possible because the crosstalk signal has a large excess

bandwidth and there is strong spectral correlation between the excess and main

bands. We also provide an intuitive error analysis on the residual error resulting

from the MMSE estimation and cancellation method. The analysis leads to an

important guidance to select the right frequency bands to observe the crosstalk

signal. A fast algorithm is also derived for practical implementation with a

small performance loss. This work has been submitted for publication [33].

Page 33: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

1.5. RESEARCH CONTRIBUTIONS 19

3. We proposed three novel water-Þlling algorithms for a Gaussian MAC with ISI.

These algorithms can be used to compute and adjust efficiently the optimal PSD

for each user. The work Þrst appeared in [34][35]. A comprehensive version of

the work has been submitted for journal publication [36].

Page 34: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Chapter 2

Crosstalk IdentiÞcation

2.1 Introduction

Digital subscriber line (DSL) technology uses the existing unshielded twisted pairs of

telephone lines to provide high-speed data transmission services to both the residential

and business customers. One major impairment of the current DSL systems is the

severe crosstalk [37] among the telephone lines in the same or neighboring bundles.

The severe crosstalk not only limits the maximum data rate of any individual line,

but can also degrade the existing services if a new service is added to the bundle.

Currently DSL system deployments uniformly assume the worst crosstalk scenario

to prevent the breakdown of the system. However, this assumption is often too

pessimistic in a real scenario and hence limits the overall performance of the system.

There are several overwhelming beneÞts to identifying the crosstalk coupling

functions among the telephone lines. First, the crosstalk functions can be used for a

multi-user detector [33][38][39] in the modem to cancel the strong interference from

other lines. Second, it can improve the data rate (or the line reach) of the systems by

enforcing a better spectrum assignment for different users. For example, if one user

causes strong crosstalk to another user in a particular frequency band, one possible

solution, other than multiuser detection, is that the interfering modem just does not

transmit signal in this frequency band. Third, the crosstalk proÞles are invaluable for

the telephone operators to maintain, diagnose, and expand the current systems. For

20

Page 35: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.1. INTRODUCTION 21

example, if an existing DSL modem breaks down, the crosstalk proÞles can make it

much easier to uncover the potential cause of the disruption.

However, it is very difficult to identify the crosstalk functions among the copper

wires because the services on these lines could belong to different operators as a re-

sult of the unbundling process and regulatory action [28] undertaken in many parts of

the world. For example, in the United States and some other countries, competitive

local exchange carriers (CLECs) can lease the telephone lines from incumbent local

exchange carriers (ILECs, the traditional phone companies) and offer DSL services

to the local subscribers. Consequently, the transmitted signals from different opera-

tors� modems are completely asynchronous. Even within the services offered by the

same operator, different types of services (HDSL, ADSL, ISDN, etc.), having different

symbol rates, are offered in the same bundle.

In the multi-operator environment, one of the major concerns is spectral com-

patibility between the signals used for transmission by different operators. This com-

patibility issue is fundamentally determined by the crosstalk level caused by different

users. There must be some level of coordination and agreement in which all opera-

tors� interests are fairly considered. Therefore, this chapter proposes a new concept

of an impartial network maintenance center (NMC) in which crosstalk identiÞcation

is processed and the spectra from different users are monitored. This NMC collects

the transmitted signals and the received signals from each modem for a predeÞned

time span. The details on how to obtain these signals are given in Section 2.2.

Because the modems in the same bundle could belong to different service oper-

ators (CLECs and ILEC), the time stamps associated with the signals from different

operators� modems could be offset by several milliseconds. Therefore, the Þrst step

of data processing is to resolve the timing differences between the transmitted signals

from different users and the received signal into one designated receiver. Since the

timing difference could be greater than one thousand data symbols, a cross-correlation

technique, which has low computational complexity, is used here to match the trans-

mitted signals of the crosstalkers to the received signals. This method can estimate

the timing difference coarsely up to a resolution of several data symbols. The cross-

correlation technique can also Þnd the strong crosstalkers for a given line. The second

Page 36: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

22 CHAPTER 2. CROSSTALK IDENTIFICATION

step is to use a least-squares estimator to jointly identify the strong crosstalk functions

and the Þner scale of the timing difference. The performance of these two techniques is

analyzed to determine the number of transmitted data symbols needed for identiÞca-

tion. If the crosstalk and the primary signal belong to different types of services (e.g.,

ADSL and HDSL), they have different symbol rates and thus the crosstalk function is

time-varying. A resampling scheme for the transmitted signals is described to ensure

the stationarity of the crosstalk function. In order to Þnd low power crosstalkers, a

successive cancellation method is needed to cancel the strong crosstalk signals before

the cross-correlation is applied to them. Otherwise the cross-correlation value may

be too small to resolve the timing difference.

This chapter is organized as follows. Section 2.2 describes the concept of the

network maintenance center and the model for crosstalk identiÞcation. Section 2.3

presents a solution that combines the cross-correlation technique and the least-squares

estimator to identify the crosstalk functions. The performance is analyzed and a re-

sampling scheme to ensure the stationarity of the channel for different types of ser-

vices is described. Simulation results are shown in Section 2.4 to verify the proposed

techniques. Section 2.5 concludes the chapter.

In this chapter, the notations are arranged with the following conventions. A

normal letter, a bold letter, and a capital letter represent a scalar, a vector, and

a matrix, respectively. The superscript symbols T and ∗ represent �transpose� and

�conjugate and transpose� operations, respectively. The normal symbol ∗ representsthe convolution operation.

2.2 Impartial NetworkMaintenance Center (NMC)

The generic crosstalk model of the DSL systems for a given receiver is shown in

Figure 2.1. The objective is to identify the crosstalk functions for the receiver. The

crosstalk includes the near-end crosstalk (NEXT) and the far-end crosstalk (FEXT)

[37]. NEXT, if it exists, is generally much larger than FEXT. Therefore, in ADSL and

VDSL systems, frequency-division duplexing is used to avoid NEXT. Nevertheless,

NEXT may still exist from other types of services like ISDN, HDSL, HDSL2, SDSL,

Page 37: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.2. IMPARTIAL NETWORK MAINTENANCE CENTER (NMC) 23

Channel h0

Crosstalkfiltering h1

Crosstalkfiltering hk

Xmit 0

Xmit 1

Xmit K

noise

+ Rcvr 0yx0

x1

xK

Figure 2.1: Network model of DSL systems for one receiver.

and SHDSL.

It is much easier to identify the crosstalk if the transmitted signals and the

received signals are both known. Based on this observation, an impartial NMC is

proposed in which the transmitted signals and the received signals during a given

time span from all modems are available for the coupling function identiÞcation. This

level of coordination is necessary and can be achieved by setting up a standard, which

suggests that each operator captures the data that ßows through each modem during

a predeÞned time period and sends them to the NMC. For example, in the central

office site, all service operators have their own DSL access multiplexers (DSLAMs)

[2] which can be used to collect the transmitted and received data in each modem

during a certain time period. The collected data is then sent to the NMC via internet

or some other means for processing. In the customer site, the modem has to store

the transmitted and received data packets and send them to the NMC. Because the

line characteristics do not change very much, these data packets can be sent either

offline when the modems are idle or via low-speed diagnostic channels currently used

in most DSL modems. The location of the NMC is not conÞned to the central office.

In return, the crosstalk functions obtained from the NMC are fed back to different

service operators who may use this information for various purposes, such as spectrum

Page 38: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

24 CHAPTER 2. CROSSTALK IDENTIFICATION

time

di Lt +1

xi(0) xi(di) xi(Lt)

y(0) y(Lt)

Figure 2.2: Timing offset between the transmitted signals and the received signals.Lt is the length of the pre-deÞned observation time span.

management, system diagnosis or expansion. These identiÞed crosstalk functions also

provide an essential initial condition for a multiuser detector to track the crosstalk

response.

The time stamp of each modem from different operators relies on the central

office clock. Unfortunately, these time stamps are not accurate and the difference

can be as large as several milliseconds. Consequently, the predeÞned time spans

from different modems are not strictly aligned together. Besides, the propagation

delays are not equal from different crosstalk sources to the receiver of interest and

this effect should also be included in the timing differences, although the differences

of the propagation delays are generally much smaller than the differences of the time

stamps. Without loss of generality, all transmitters are assumed to have nonnegative

timing difference (di ≥ 0) with respect to the time stamp of the designated receiver,as shown in Figure 2.2. Note that the timing difference di is represented in terms of

the clock cycles of the receiver and it has an integer value. The fractional portion

of the delay is absorbed into the channel/crosstalk response. The received output is

then

y(m) =KXi=0

hi(m) ∗ xi(m+ di) + n(m) (2.1)

Page 39: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.3. CROSSTALK IDENTIFICATION 25

where xi: the ith transmitted signals

hi : the channel response (i = 0)

or the crosstalk function (i > 0)

di : the timing difference, integer value

n : white Gaussian noise with variance σ2nK : number of crosstalkers.

The main problem is to Þnd the crosstalk functions hi, given the known transmit-

ted signals xi, the received signals y, and the statistics of the noise n. In general, the

channel response ho(m) is known and do equals zero because the transmitter and the

receiver in both ends of the same channel are synchronized. As a result, the signal

component can be subtracted from the received signal. In the rest of this chapter,

only the crosstalk signals are considered.

2.3 Crosstalk IdentiÞcation

Since the timing differences di could correspond to several thousand symbols, it is

computationally prohibitive to apply the classical least-squares method directly to

(2.1) because it requires the multiplication and inversion of large matrices. Therefore,

the cross-correlation technique is Þrst used to estimate the timing differences di of

the dominant crosstalkers. Then the crosstalk functions are identiÞed by the least-

squares estimator and the crosstalk signals are subtracted from the received signal.

The subtraction of the dominant crosstalk signals makes it easier to estimate the

timing difference of the smaller crosstalk signals. This successive cancellation process

is repeated until all interested crosstalk functions are identiÞed.

The performance of the cross-correlation technique is analyzed to determine the

number of symbols required for estimation of the timing differences. Similarly, the

performance analysis of the least-squares estimator is studied to determine the trade-

off between the estimation error and the number of data symbols. The classical result

of the least-squares estimator focuses on the residual error [40, p. 32]. This chapter

takes a different perspective by analyzing the error of the estimated parameter itself

and exploits the well-known results in the multivariate statistics area of the inverted

Page 40: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

26 CHAPTER 2. CROSSTALK IDENTIFICATION

Wishart function [41] [42].

2.3.1 Timing Difference Estimation

The cross-correlation technique has been used to estimate the time delay of arrival

(TDOA) [43]. The problem posed here is different in that there are many crosstalkers,

which have unknown responses hi with many taps. The exact delay estimation is not

required in this step. Instead, only coarse estimation of the timing differences di is

pursued.

The cross-correlation is deÞned as

Ryxi(l) = E{y(m)x∗i (m+ l)}. (2.2)

Assume that the transmitted signals from different users are independent and have

zero mean, i.e., E(xix∗j) = 0 for i 6= j and E(xi) = 0. The noise is uncorrelated

with all users� signals. The number of taps for hi is assumed to be νi + 1. Then by

substitution of y(m), (2.2) can be rewritten as

Ryxi(l) =νiXt=0

hi(t)Rxi(l − di + t) (2.3)

whereRxi is the autocorrelation function of xi. In the ideal case where the transmitted

signals xi are uncorrelated and have an average energy of εi, i.e., Rxi(k) = εiδ(k),

Ryxi(l) = εihi(di − l). (2.4)

Because the crosstalk function is a causal Þnite impulse response (FIR), the timing

delay di can be estimated by the maximum ld such that |Ryxi(ld)| > 0. Unfortunately,the autocorrelation of the transmitted signals is rarely a delta function in DSL systems

and can only be obtained approximately by averaging over a large number of data

samples. Therefore, it is difficult to identify the crosstalk function directly from

(2.3). Nevertheless, it is possible to use this equation to roughly estimate the timing

Page 41: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.3. CROSSTALK IDENTIFICATION 27

difference di by searching for the peak of |Ryxi(l)|, i.e.,

�di = argmaxl|Ryxi(l)|. (2.5)

The applicability of this method is strongly justiÞed by the following two observations:

1. The transmitted signals are very loosely correlated, the auto-correlation func-

tion Rxi(k) is almost equal to zero if k is larger than several symbols;

2. hi(t) is an FIR Þlter with a narrow peak in the time domain.

The cross-correlationRyxi is approximated by averaging over many data samples,

�Ryxi(l) =1

N

NXm=1

y(m)x∗i (m+ l) (2.6)

where N is the total number of the data symbols used for averaging. The compu-

tational complexity of this method is approximately O(Ndi) for user i. The number

of data symbols N should be carefully selected to achieve a good trade-off between

the computational complexity and the accuracy of the estimation. In the rest of this

subsection, the rough estimation of N is discussed.

The mean of the cross-correlation �Ryxi is

E( �Ryxi(l)) = Ryxi(l).

The variance of the cross-correlation Ryxi is (see Appendix A for details)

σ2R = var( �Ryxi(l))

≈ εiN

ÃKXj=1

εj||hj||2 + σ2n!. (2.7)

where ||hj|| is the Euclidean norm of the crosstalk function hj(t). This above approx-imation is surprisingly simple in that user j contributes εiεj||hj||2/N to the variance.

To detect the peak value of cross-correlation | �Ryxi(l)| reliably, the ratio of the peak

Page 42: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

28 CHAPTER 2. CROSSTALK IDENTIFICATION

to the standard deviation can be set to a large value, a, so that

maxl

¯�Ryxi(l)

¯σR

> a.

This is equivalent to

N &a2εi

³PKj=1 εj||hj||2 + σ2n

´³maxl

¯�Ryxi(l)

¯´2 .

If the crosstalk signals are assumed to have the same energy and the transmitted

signals are temporally uncorrelated, the inequality can be further simpliÞed using

(2.4) to the following form:

N &a2³PK

j=1 ||hj||2 + σ2n/εi´

³maxν|hi(ν)|

´2 , (2.8)

which provides a good guidance for the selection of a reasonable number for N . In

typical DSL system models, the background noise is assumed to have power spectral

density (PSD) of −140 dBm/Hz. Let us consider two special cases, where a = 10 andthe background noise is ignored.

Example 1 Suppose there are 10 crosstalkers that have the same order of magni-

tudes, i.e., ||hj|| ≈ ||hi|| for all j. Then N ≈ a2K = 1000, based on (2.8).

Example 2 Suppose that crosstalker 2 is dominant and is 20 dB above the others,

i.e., ||h2|| ≈ 10||hj||, j 6= 2. Then for crosstalker 2, N ≈ a2 = 100. However, to

estimate the timing offset of other crosstalkers, N ≈ ||h2||2a2/||hj||2 = 10, 000. If

there is not enough data available, the dominant crosstalkers need to be canceled Þrst

and the timing difference estimation for others is then performed afterwards.

2.3.2 Crosstalk Functions Estimation

After the timing differences di between the crosstalk signals and the received signals

are grossly estimated, the crosstalk functions and the more accurate timing differences

Page 43: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.3. CROSSTALK IDENTIFICATION 29

can be obtained jointly by a least-squares estimator. In fact, if some crosstalk signals

are too small, the timing differences found through cross-correlation may not be

accurate enough for the least-squares estimator. Depending on the objective, the

receiver can either ignore these small crosstalkers or identify them by Þnding Þrst the

strong crosstalk signals and subtracting them from the received signal.

Least-squares Estimation

Let us denote the timing estimation error from the cross-correlation technique by

∆i = di − �di, and the shifted input by zi(m) = xi(m + �di). The crosstalk network

model can be rewritten as

y(m) =KPi=1

hi(m) ∗ zi(m+∆i) + n(m) (2.9)

where the notation is the same as in the original model (2.1). The difference is that

the timing difference ∆i in the new model is much smaller than di in the original

model, which makes it simpler to use the least-squares method.

In the ideal case where the transmitted signals are uncorrelated (Rxi(m) =

εiδ(m)), ∆i is the tap number where the absolute crosstalk response |hi(∆i)| hasa peak value. In practice, the transmitted signals are weakly correlated, therefore

∆i should be in the vicinity of the tap where the absolute crosstalk response is max-

imum. Mathematically, ∆i ≈ argmaxm(|hi(m)|) and 0 ≤ ∆i ≤ νi. Note that the

exact length of the crosstalk response (νi+1) is unknown. Fortunately, a vast number

of measurements of the actual crosstalk transfer functions in the Þeld have been taken

in the past to obtain the statistical behavior of the crosstalk. From measured results,

an upper bound on the tap number is empirically available, which can be used to

approximate νi.

The basic idea for joint detection of the crosstalk response and the delay is

explained in the following three steps:

1. assume the length of the crosstalk response to be 2νi + 11 in order to include

the effect of the timing offset ∆i;1If 0 ≤ ∆i ≤ c, then the crosstalk response is extended to νi + 1+ c.

Page 44: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

30 CHAPTER 2. CROSSTALK IDENTIFICATION

2. use the least-squares estimator to estimate the crosstalk response of length

2νi + 1;

3. determine those taps whose coefficients are almost equal to zero in the head and

the tail of the crosstalk response, which can be used to Þnd the timing offset

∆i. By truncating these taps, the crosstalk response is obtained.

The matrix representation of (2.9) can be written as

y=hZ1 Z2 . . . ZK

i

h1

h2

...

hK

+ n

= Z·h+ n (2.10)

where y is the received signal vector, Zi ∈ CN×(νi+1) the transmitted Toeplitz datamatrix, hi the crosstalk response vector, i = 1, . . . ,K, and n the white Gaussian

noise vector. SpeciÞcally,

y=hy(N − 1) y(N − 2) . . . y(0)

iTZi=

zi(N − 1− νi +∆i) · · · zi(N − 1 +∆i)

.... . .

...

zi(−νi+∆i) · · · zi(∆i)

hi =

hhi(νi) hi(νi−1) · · · hi(0)

iT(2.11)

where N is the number of data samples. Since ∆i ∈ [0, νi], each row of the datamatrix Zi and the crosstalk response vector hi can be extended in both directions,

Page 45: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.3. CROSSTALK IDENTIFICATION 31

i.e.,

hi= [hi(νi+∆i) · · ·hi(νi) · · ·hi(0) · · ·hi(∆i−νi)]T

Zi=

zi(N − 1− νi) · · · zi(N − 1+νi)

.... . .

...

zi(−νi) · · · zi(νi)

(2.12)

where Zi ∈ CN×(2νi+1) and hi ∈ C(2νi+1)×1. The same notation is used in (2.11) and(2.12) to simplify notation. Note that hi are padded with ∆i zeros on the top and

νi −∆i zeros in the bottom. From (2.10), the unbiased estimation of h is given [44]

by

h = (Z∗Z)−1Z∗y (2.13)

where ∗ represents conjugate and transpose. Truncation of those taps corresponding

to relatively small values in both sides of the vector hi yields the crosstalk response

and the timing offset∆i. For fast algorithms that calculate (2.13) utilizing the (block)

Toeplitz structure of the data matrix, see [45][46] and the references therein.

Performance Analysis

In this subsection, the estimation errors of the crosstalk responses are analyzed with

respect to the number of data symbols N . The covariance matrix of the estimated

response h can be computed as

cov(h) = E(h− h)(h− h)∗ = σ2n(Z∗Z)−1 (2.14)

where σ2n is the noise variance. Let�s denote L = Z∗Z and the i-th row of the data

matrix Z as zi, i = 1, . . . , N. Suppose all rows zi (i = 1, . . . , N) are distributed

independently, each according to the normal distribution2 N(0,Σ). Then L has the

Wishart distribution [47] with a covariance matrix Σ and M dimensions, where M is

2It should be noted that there are two approximations in using the results of the inverted Wishartfunction. First, the data is not really normally distributed. Second, the adjacent rows of the datamatrix are not exactly independent.

Page 46: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

32 CHAPTER 2. CROSSTALK IDENTIFICATION

the number of columns inZ, i.e., the number of taps to be estimated. Correspondingly,

L−1 has the inverted Wishart distribution. The DSL systems considered here use

baseband transmission. Therefore, the data matrix Z contains only real elements.

The Þrst and the second moments of the inverted real Wishart function L−1 (N >

M + 3) are [41]

E(L−1) =1

N −M − 1Σ−1

E(lijlrs)=(N −M − 2)σijσrs+σirσjs+σisσjr(N −M − 3)(N −M − 1)(N −M)

(2.15)

where the elements of an inverted matrix are denoted by the symbols with superscript,

for example, lij and σij denote the (i, j) entry of the inverted matrices L−1 and Σ−1,

respectively. The input signals are assumed to be white and uncorrelated between

different users. If we scale different users� transmitted energy to 1 (εxi = 1), then

Σ = I. The normalized sum of the squared estimation errors is

eh =trace(cov(h))

σ2n.

The mean and the variance of eh follow directly from (2.15)

E(eh) = trace(E(L−1))

=M

N −M − 1 (2.16)

var(eh) =2M(N − 1)

(N −M − 1)2(N −M)(N −M − 3)≈ 2M

N3, if N ÀM. (2.17)

Several interesting observations are extracted from the expression above.

� The sum eh of the squared estimation errors is reduced asymptotically by 1/N

in the mean sense.

Page 47: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.3. CROSSTALK IDENTIFICATION 33

� If N = 2M + 1, eh equals 1 in the mean sense. The standard deviation of

eh approximately equals 2/M, which is relatively small when M is large (e.g.,

M > 10). This suggests that the sum of the squared estimation errors is almost

same level as the noise.

� When N is large, the standard deviation of eh approaches 0 in the order of

N−1.5.

Therefore, to keep the estimation error equal to the noise level, the number

of data symbols needed is about twice the number of the estimated parameters.

Doubling the amount of data reduces the estimation error by 3 dB. For the case of

a complex input data matrix Z, the equations for the Þrst and the second moments

of the inverse Wishart function are slightly different [42], but the above rule is also

applicable.

Recall that we extend the length of each crosstalk channel to 2νi+1 in order to

jointly estimate the channel response and the timing offset ∆i. After the estimation,

we truncate the head and the tail of the channel response hi to obtain the actual

channel response. Since the timing offset ∆i is now known, we can apply the least-

squares estimator again to solve the real channel response hi with a narrower matrix

Z. The new data matrix Z has size N × �M , where �M =PK

i=1 νi + 1 ≈ M/2.

Therefore, with the same amount of data, the error is reduced by 3 dB.

Comments on Successive Cancellation

In order to estimate the timing differences for small crosstalkers, it is necessary to Þrst

estimate and cancel the strong crosstalk signals. However, the residual error, resulting

from cancellation of the strong crosstalk signals, may be about the same power as the

smaller crosstalk. Therefore, the previously canceled strong crosstalk signals should

be estimated jointly with the smaller crosstalk signals for the least-squares estimation

in order to reduce the estimation errors of the smaller crosstalk functions. Otherwise,

a large number of data symbols is needed to estimate the smaller transfer functions

because doubling the number of data symbols only reduces the estimation error by

3 dB. The following is an example to illustrate the point.

Page 48: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

34 CHAPTER 2. CROSSTALK IDENTIFICATION

Tx Filterp(t)

xTalkh(t)

Rcvr Filterhlp(t)1/T

al1/T'

yxc(t)

Figure 2.3: A baseband crosstalk model.

Example 3 Suppose an xDSL system has two crosstalkers. Crosstalkers 1 and 2

have PSD levels of −100 dBm/Hz and −120 dBm/Hz, respectively. The backgroundnoise has PSD level of −140 dBm/Hz. The signal of crosstalker 1 is estimated andcanceled Þrst. The residual error is assumed to be −122 dBm/Hz. Now if the signalof crosstalker 2 is estimated by treating the residual error as noise, it would need

about 28(ν2 + 1) data symbols to reduce the estimation error down to −143 dBm/Hz,according to the analysis in Sec. 2.3.2. In contrast, if the signals of crosstalkers 1 and

2 are estimated together, it needs only 2(ν1+ν2+2) data symbols, where νi+1, i = 1, 2,

are the tap numbers.

2.3.3 Resampling for Different Services

As mentioned in the introduction, many different services exist in the same bundle

of the telephone cables and have different sampling rates. Therefore, the discrete

(sampled) crosstalk function will vary with time if the receiver and the crosstalk

transmitter belong to different services and have different symbol rates. However, if

we can resample the transmitted signals with the same clock as in the receiver, the

crosstalk function is stationary because it reßects the physical conÞguration of the

lines. Figure 2.3 shows a typical baseband crosstalk diagram in the DSL systems,

where p(t), h(t) and hlp(t) are the transmit Þlter, the crosstalk response, and the

receiver low pass Þlter respectively. The sampling rates for the transmitter and the

receiver are 1/T and 1/T 0, respectively. The transmitted continuous time signal is

Page 49: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.3. CROSSTALK IDENTIFICATION 35

xc(t) =N−1Pl=0

alδ(t− lT − τ) ∗ p(t)

where T is the sampling period, al the discrete data stream, N the total number of

data symbols to be transmitted, and τ is the fractional delay in terms of the receiver

clock. The received signal before sampling is

yc(t) =N−1Pl=0

alδ(t− lT ) ∗ p(t− τ) ∗ h(t) ∗ hlp(t)| {z }q(t)

+ n(t)

=N−1Pl=0

alδ(t− lT ) ∗ 1T 0sinc

µt

T 0

¶∗ q(t) + n(t)

=1

T 0N−1Pl=0

alsinc

µt− lTT 0

¶| {z }

x(t)

∗ q(t) + n(t) (2.18)

where q(t) is the aggregated crosstalk function of concern and x(t) is the re-constructed

transmitted signal. The second equation above follows from the fact that yc(t) is not

changed by multiplying by another low-pass Þlter 1/T 0sinc(1/T 0) if the receiver low-

pass Þlter hlp is ideal. The bandwidth of the crosstalk function q(t) is determined by

the smallest bandwidth of p(t), h(t), and hlp(t). In other words, the identiÞable band

of the crosstalk is limited by the smallest frequency band of the crosstalk signal, the

crosstalk channel response, and the receiver Þlter. After sampling at a rate of 1/T 0,

we obtain the discrete received signal

y(m) = x(m) ∗ q(m) + n(m)

where

x(m) =N−1Pl=0

alsinc

µm− lT

T 0

¶. (2.19)

Since both x(t) and q(t) have a bandwidth less than 1/(2T 0), there is no aliasing after

sampling. The resampling function sinc is not unique, many other functions (e.g., the

raised cosine) can be used as alternative resampling functions.

The resampled signals x(m) are usually non-stationary and correlated. Therefore

Page 50: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

36 CHAPTER 2. CROSSTALK IDENTIFICATION

the performance analysis in subsection 2.3.2 should be used cautiously because it is

based on the assumption that the transmitted signals are white. Nevertheless, the

simulation results still suggest the residual error estimation conforms to the result

of (2.16) very well. These results are not so surprising because the signals al before

resampling are white and thus the resampled signals should contain all the necessary

modes to excite all the frequencies of interest. If the transmitted signal is upsampled,

the covariance matrix Z∗Z is close to singular and the least-squares estimator can

not be applied directly. One solution is to expand the bandwidth of the signal x(m)

to the bandwidth of the receiver Þlter during the resampling process. This expansion

of the bandwidth will make the covariance matrix have a good condition number and

cause a negligible effect in the estimation error.

2.4 Simulation Results

This section shows the simulation results of crosstalk identiÞcation in the upstream

direction (from the subscriber to the central office). The receiver of interest is assumed

to be an ADSL modem. To reßect a typical crosstalk environment, the number and

the type of the crosstalkers are assumed to be:

� 4 Basic Rate ISDNs (BRIs)

� 4 HDSLs

� 5 ADSLs.

All twisted pairs are assumed to be 26-gauge (0.4mm) and 9000-feet (2744m)

long. The dominant crosstalk signals consist of NEXT from BRIs and HDSLs. There

is no NEXT from ADSL because most of the deployed ADSL modems use frequency-

division duplexing scheme. The smaller crosstalk signals consist of FEXT from AD-

SLs, BRIs, and HDSLs. Several important characteristics of DSLs are taken from

ITU-T Recommendation G.996.1 [48] and summarized in Table 2.1.

The transmit Þlters (including pulse shaping Þlters) from different types of DSLs

can also be found in [48] or the corresponding standards. For brevity, we denote

Page 51: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.4. SIMULATION RESULTS 37

DSL ADSL(up) BRI HDSLLine code DMT 2B1Q 2B1Q

Sampling ratefo (ks/ sec)

276 80 392

Power (dBm) 12.5 13.6 13.6

Table 2.1: DSL Characteristics

them as P (f) and omit their mathematical formula here. The model for NEXT is

commonly known as

|HNEXT (f)|2 ≈ 10−14f3/2.

The model for FEXT is

|HFEXT (f)|2 ≈ |Hchannel(f)|2 × 10−20f2l,

where l is the loop length in meters and Hchannel is the loop channel response. Un-

fortunately, these models do not provide the phase information. We assume all the

crosstalk transfer functions have a linear phase. The interested NEXT and FEXT

functions are, respectively,

QN(f) = PDSL(f)HNEXT (f)Hlp(f)

QF (f) = PDSL(f)HFEXT (f)Hlp(f)

where Hlp is the receiver low-pass Þlter and PDSL(f) is a generic term for the trans-

mitter Þlter response of BRIs, HDSLs and ADSLs. The magnitudes of NEXT and

FEXT are plotted in Figures 2.4-2.5. NEXT is about 20 dB above FEXT.

In the simulation, each crosstalk signal is transmitted with a random timing

offset with respect to the ADSL receiver. This integer offset is uniformly distributed

in the range of [0, 500]. The fractional delay is absorbed into the crosstalk function

as described in (2.18). We identify NEXT Þrst. The cross-correlation technique is

used to coarsely estimate the timing offsets di. Figure 2.6 shows the absolute cross-

correlation value for one HDSL NEXT. As expected in the example of Section 2.3.1,

the peak value is much higher than the rest of values and gives a good estimate of

Page 52: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

38 CHAPTER 2. CROSSTALK IDENTIFICATION

0 50 100 150 200 250-150

-140

-130

-120

-110

-100

-90xDSL induced NEXTs to ADSL upstream

Khz

NEX

Ts P

SD (d

Bm/H

z)

ISDN_NEXTHDSL_NEXTNoise

Figure 2.4: NEXT from HDSL and ISDN. Each curve represents only one crosstalker.

Page 53: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.4. SIMULATION RESULTS 39

0 50 100 150 200-145

-140

-135

-130

-125xDSL induced FEXTs to ADSL upstream

Khz

FEXT

PSD

(dBm

/Hz)

ISDN_FEXTHDSL_FEXTADSL_FEXTNoise

Figure 2.5: FEXT from ADSL, ISDN, and HDSL. Each curve represents only onecrosstalker.

Page 54: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

40 CHAPTER 2. CROSSTALK IDENTIFICATION

the timing offset. With the rough estimated �di, a least-squares estimator is used to

0 100 200 300 400 5000

0.5

1

1.5

2

2.5

3

3.5x 10-6

Offset

Abso

lute

Cro

ss-c

orre

latio

n Va

lue

Cross-correlation for HDSL NEXT (N=1000)

Peak to STD = 12.6

Figure 2.6: Absolute cross-correlation value between the received signal and the HDSLtransmitted signal.

identify the crosstalk responses. Figure 2.7 shows an actual HDSL NEXT function

and its estimate. They almost overlap each other. Figure 2.8 shows the error ehcaused by the crosstalk function estimation error. Clearly, the performance analysis

in Section 2.3.2 is consistent with the result. Note that N = 2M + 1 is a critical

point, whereM is the number of the estimated parameters,M =P8

i=1(νi+1) = 248.

When N > 2M , doubling the number of the data symbols reduces the error eh by 3

dB. However, the error grows rapidly when the number of data is less than 2M.

It may also be interesting to identify the smaller FEXT. Since they are much

smaller than NEXT, NEXT is Þrst identiÞed and canceled from the received signal

y. Then the above two steps can be applied again to Þnd the FEXT functions. The

simulation results are similar and not shown here. It should be noted that we also

Page 55: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.4. SIMULATION RESULTS 41

0 0.02 0.04 0.06 0.08 0.1 0.12-6

-4

-2

0

2

4

6

8

10

12x 10-7

Time (ms)

Res

pons

e

HDSL Crosstalk Time Responses

Real Response Estimated Response

Figure 2.7: HDSL NEXT time response and its estimate.

Page 56: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

42 CHAPTER 2. CROSSTALK IDENTIFICATION

500 1000 1500 2000-140

-135

-130

-125

-120

-115

-110

-105

Number of Data N

Erro

r in

dB

NEXTs Estimation Error

Error Noise +FEXTs

Figure 2.8: The sum of the squared crosstalk estimation error.

Page 57: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

2.5. CONCLUSIONS 43

simulated the case where the actual measured NEXT and FEXT data is used. The

results are also consistent with the analysis.

2.5 Conclusions

Crosstalk is a major impairment of DSL systems, which signiÞcantly limits the data

rate and the reach of the twisted pairs. For both ILECs and CLECs, it is invaluable

to identify the crosstalk environment for each pair and thus offer better services to

more users. However, because of the competitive nature of ILECs and CLECs, there

is little coordination between them so far. In this chapter, an impartial NMC concept

is proposed to process the data from all service operators and estimate the crosstalk

functions for them. First, a cross-correlation technique is used to determine which

lines are coupled with a given line and roughly align the time stamp associated with

the data coming from different modems. The amount of data needed for calculating

the cross-correlation is also analyzed to achieve a low computational complexity. Then

a least-squares estimator is used to estimate the crosstalk response and the Þner-scale

of timing offset jointly. The performance of the least-squares estimator is analyzed

by exploiting the results of the inverted Wishart function. This theoretical result can

be used to determine the number of the data samples needed for the estimator. The

simulation results conÞrmed that the proposed techniques can identify the crosstalk

responses very accurately with a reasonable computational complexity.

Page 58: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Chapter 3

Crosstalk Cancellation

3.1 Introduction

One of the major impairments of DSL systems is the severe crosstalk [37] among

the telephone lines in the same or neighboring bundles. The crosstalk is classiÞed

into near-end crosstalk (NEXT) and far-end crosstalk (FEXT). In general, NEXT

is much larger than FEXT because the interference source is closer to the receiver.

Therefore, ADSL and VDSL use frequency division duplexing (FDD) to avoid NEXT

from the same services. However, other types of services (such as HDSL, SDSL, T1,

etc.), which use different duplexing schemes and overlap in frequency with ADSL and

VDSL, may produce detrimental NEXT. Mitigating the effect of NEXT by cancelling

it in a DSL receiver can dramatically increase the data rate, the line reach, or the

system operational margin.

The optimum detector for interference cancellation can be theoretically achieved

by maximizing the a posteriori probability of the primary signal (MAP rule), which is

unfortunately too complex in practice. Some suboptimal multiuser detectors [49][50][38][39]

were proposed to mitigate or cancel the interference signal in the non-spreading sys-

tem. These detectors decode each user�s data using �soft� symbols and iterate the

detection process until a certain criterion is reached (e.g., the maximum number of

iterations). The convergence of this type of the algorithm is an open problem. The

algorithm is still very complex when the signals have large constellation sizes [39].

44

Page 59: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.1. INTRODUCTION 45

This chapter presents new practical methods to cancel or mitigate one (domi-

nant) NEXT into an ADSL receiver. The principal idea is to estimate the crosstalk

signal in certain frequency bands and subtract it in other frequency bands. A similar

idea [25][26] has been previously used to suppress very narrow band radio frequency

interference (RFI) in VDSL systems. The crosstalk signal into an ADSL receiver

has large excess bandwidth and its spectra in the main lobe and the excess band

are strongly correlated, which gives the opportunity to cancel the crosstalk signal in

some dependent frequency bands. For example, the crosstalk can be estimated in

the excess band and cancelled in the main lobe; or vice versa. This chapter provides

guidance on how to select the best frequency bands to observe the crosstalk signal

and an intuitive interpretation of the crosstalk cancellation process. Another impor-

tant aspect of the proposed techniques is that they can be implemented with low

computational complexity, without matrix inversion or large matrix multiplication in

each transmission block.

Previously, the fractionally-spaced equalizer (FSE) was used to suppress cyclo-

stationary NEXT [51][52] if both the crosstalk signals and the primary signal are

synchronized and have excess bandwidth. The FSE processes the signals� spectrum

in both the main band and the excess band. The folded spectrum after resampling

to the symbol rate then provides the ßexibility to suppress NEXT in the main band.

The problem addressed in this chapter is different mainly in the following two as-

pects. First, the primary signal (ADSL) and the crosstalk signal (such as NEXT

from HDSL, SDSL, T1) have completely different modulation schemes and sampling

rates. Second, the primary received signal is decoded in the frequency domain, thus

the crosstalk signal suppression is also processed in the frequency domain. In fact, the

frequency domain explanation in this chapter provides insight into how much NEXT

can be suppressed.

This chapter proceeds as follows. Section 3.2 describes the system model of

the primary and crosstalk channels. Section 3.3 presents the methods to cancel the

crosstalk signal and a fast computation scheme for practical implementation. The

methods are then extended to estimate and cancel two or more crosstalkers. Simu-

lation results are shown in Section 3.4 to verify the proposed methods. Section 3.5

Page 60: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

46 CHAPTER 3. CROSSTALK CANCELLATION

concludes the chapter.

In this chapter, the notations use the following conventions. A small letter, a

bold small letter, and a capital letter represent a scalar, a vector, and a matrix,

respectively. The superscript symbols T and ∗ represent �transpose� and �conjugate

and transpose� operations, respectively.

3.2 System Model

ADSL [53] uses the discrete multiple tone (DMT) modulation scheme [10][11] for data

transmission. DMT is an effective realization of multicarrier transmission [12][13][23],

which partitions the intersymbol interference (ISI) channel into a large number of nar-

rowband subchannels. There is no or little ISI in each subchannel if the bandwidth of

the subchannel is sufficiently narrow. The data is then transmitted in each subchan-

nel almost free of ISI. A subchannel is more often called a �tone� in DMT systems

and this terminology will be used in the rest of this chapter.

The crosstalk signals from HDSL, SDSL, T1, or ISDN have different modulation

schemes. HDSL, SDSL, and ISDN use 2B1Q baseband transmission and T1 uses

alternative mark inversion (AMI) baseband transmission.

Figure 3.1 shows a general model of a primary DMT transmission system with

one crosstalker. The cyclic preÞx is not shown in the Þgure. The primary channel

has a sampling rate of 1/T , but the interference signal has a sampling rate of 1/Tcat the transmitter. As a result, the received crosstalk signal is not stationary. With

this general model, the received time-domain output is

y(t) =Pi

aip(t− iT ) +Pk

bkc(t− kTc + τ) + n(t) ∗ hlp(t)| {z }�n(t)

(3.1)

where ai and bk are the primary transmitted signal and the transmitted crosstalk

signal, respectively. τ (0 < τ < Tc) is a fractional timing difference between the

transmitted primary signal and the crosstalk signal. p(t) and c(t) are the aggregated

Page 61: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.2. SYSTEM MODEL 47

+

n

1/T

ai Tx Filterg(t)

Channelh(t)

Rcvr Filterhlp(t)

IFFTQ*

αααα

FFT --- Q

1/Tyi

z1/Tc

bk Tx Filtergc(t)

xTalkhc(t)

Figure 3.1: The primary and crosstalk channel model.

channel and crosstalk responses, respectively. Mathematically (refer to Figure 3.1),

p(t) = g(t) ∗ h(t) ∗ hlp(t) (3.2)

c(t) = gc(t) ∗ hc(t) ∗ hlp(t). (3.3)

Both are causal and have Þnite impulse responses. After sampling, the discrete

output is

ym =Pi

aip ((m− i)T ) +Pk

bkc(mT − kTc + τ) + �nm. (3.4)

In DMT systems, the data is transmitted in a block fashion. Suppose the block

size (FFT size) is M , the above equation in one block can be represented compactly

in a matrix form:

y = Pa+ Cb+ n, (3.5)

where y = [yM−1, yM−2, . . . , y0]T , a = [aM−1, aM−2, . . . , a0]T , b = [bL−1, . . . , b0,. . . , b−µ]T , n = [�nM−1, �nM−2, . . . , �n0]T , P and C are the channel and crosstalk re-

sponses matrices, respectively. The DMT signal has a cyclic preÞx (aM−i = a−i,

Page 62: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

48 CHAPTER 3. CROSSTALK CANCELLATION

i = 1, . . . , ν), therefore the channel response matrix P is circulant and has the fol-

lowing form,

P =

p0 · · · pν−1 pν 0 · · · 0

0 p0 · · · pν−1 pν. . . 0

.... . . . . . . . . . . . . . . . . .

0 · · · 0 p0 · · · pν−1 pν

pν 0 · · · 0 p0 · · · pν−1...

. . . . . . . . . . . . . . . . . .

p1 · · · pν 0 · · · 0 p0

where ν +1 is the number of taps of the channel response p(t). The crosstalk matrix

CM×(L+µ) is

C =

c(τ − (L− 1)T c+(M − 1)T ) · · · c(τ + (M − 1)T ) · · · c(µT c+τ + (M − 1)T )c(τ − (L− 1)T c+(M − 2)T ) · · · c(τ + (M − 2)T ) · · · c(µT c+τ + (M − 2)T )

......

......

...

c(τ − (L− 1)T c+T ) · · · c(τ + T ) · · · c(µT c+τ + T )

c(τ − (L− 1)T c) · · · c(τ) · · · c(µT c+τ)

where µ + 1 is the number of taps of the crosstalk response, L is the number of

crosstalk symbols in one DMT block (L = dMT/Tce). Note that there are many zeroentries in the above matrix C. Since the delay τ changes from block to block, the

matrix C varies over different blocks.

With a cyclic preÞx, the circulant matrix P can always be decomposed [54, p.

201-2] as

P = Q∗ΛQ (3.6)

where Q is a fast Fourier transform (FFT) matrix, and Λ is a diagonal matrix whose

Page 63: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.2. SYSTEM MODEL 49

diagonal elements correspond to the frequency response of the channel. More specif-

ically, the FFT matrix is

Q =1√M

e−j2πM(M−1)(M−1) · · · e−j 2π

M(M−1) 1

e−j2πM(M−2)(M−1) · · · e−j 2π

M(M−2) 1

......

......

e−j2πM(M−1) · · · e−j

2πM 1

1 · · · 1 1

and the diagonal elements of Λ from the top left to the right bottom are

diag(Λ) = Q ·

0...

pν...

p0

.

At the transmitter, the signal α is modulated in the frequency domain and

transformed into the time domain by an inverse FFT for transmission, i.e., a = Q∗α.

At the receiver, the received signal is transformed back to the frequency domain.

Therefore, the whole system model in the frequency domain is

z = Qy = Λα+QCb+ n. (3.7)

where z = [zM−1, zM−2, . . . , z0]T , and the white Gaussian noise n = Qn has the

same variance as n. The traditional system treats the crosstalk signal as Gaussian

interference, which signiÞcantly limits the overall system performance. This chapter

presents new methods to cancel or suppress the crosstalk component QCb in the

received signal. The channel and crosstalk responses p(t) and c(t) are assumed to

be known in the ADSL receiver. The channel response is obtained through training

sequences and the crosstalk response can be acquired by the method in [32].

Page 64: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

50 CHAPTER 3. CROSSTALK CANCELLATION

3.3 Crosstalk Cancellation

The principal idea of crosstalk cancellation in this section is Þrst to estimate the

crosstalk signal by observing the output of certain frequency bands and then to re-

construct the crosstalk signal in other bands to cancel, or minimize, the interference.

If the crosstalk signal has an excess bandwidth, like HDSL and SDSL crosstalkers,

the cancellation is possible because the excess bandwidth provides more information

about the crosstalk signal. In this section, the basic idea to cancel the crosstalk signal

is described under the terminology of the above system model. A geometrical inter-

pretation is introduced to explain the cancellation process intuitively and to select

the right frequency bands to observe the crosstalk signal. Then, a fast computational

method is proposed for practical implementation, which avoids the matrix inversion

in the crosstalk signal estimation and cancellation. Finally, the method is extended

to more than one crosstalker.

3.3.1 Crosstalk Signal Estimation and Cancellation

ADSL uses DMT modulation and the received signal is processed in the frequency

domain. In order to detect and cancel the crosstalk signal, all the tones of interest1

are partitioned into two disjoint sets, S1 and S2. In set S1, the DMT system treats

the crosstalk signal as a Gaussian noise, like a traditional system. The primary signal

is detected and subtracted from the received signal. Then the crosstalk signal b is

estimated by observing the residual signal in set S1. With the estimated crosstalk

signal b, the interference in set S2 can be constructed and subtracted from the received

signal. If the interference in set S2 can be completely eliminated, then the primary

DMT system will have a signiÞcantly higher signal to interference and noise ratio

(SINR) and more bits can be transmitted in this set of tones. The channel model

representation in (3.7) is re-grouped according to the partition:

1Only includes those tones where the crosstalk signal exists, not all the tones in the ADSLreceiver.

Page 65: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.3. CROSSTALK CANCELLATION 51

"z2

z1

#=

"Λ2α2

Λ1α1

#+

"Q2Cb

Q1Cb

#+

"n2

n1

#(3.8)

where every vector or matrix with the subscript belongs to the set with the same

subscript. For example, z1 and z2 are the received data in sets S1 and S2, respectively.

Assume the primary signal in set S1 can be detected reliably and denote z1 = z1 −Λ1α1, then the crosstalk signal can be estimated by a linear minimum mean-squares

error (MMSE) estimator [44, p. 95] as

b = (R−1b + C∗Q∗1R−1n Q1C)

−1C∗Q∗1R−1n z1 (3.9)

where Rb and Rn are the signal and noise covariance matrices respectively. The trans-

mitted crosstalk signal sequence b and the background noise are normally assumed

to be white, and the crosstalk signal can be assumed to have unit variance without

loss of generality. Then the above equation can be further simpliÞed to

b = (σ2nI + C∗Q∗1Q1C)

−1C∗Q∗1z1 (3.10)

where σ2n is the background noise variance. There are several different approaches to

construct the crosstalk signal in set S2. Here are the two simple approaches.

1. Linear MMSE estimation and cancellation. The receiver directly uses the esti-

mated signal from (3.10) to construct the interference signal:

Xc = Q2Cb

= Q2C(σ2nI + C

∗Q∗1Q1C)−1C∗Q∗1z1. (3.11)

and subtracts it from the received signal in set S2. In fact, b can be considered

as a special kind of �soft� decision for interference cancellation. The error

Page 66: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

52 CHAPTER 3. CROSSTALK CANCELLATION

covariance matrix of the estimated crosstalk signal from (3.10) is

²b = E(b− b)(b− b)∗

= σ2n(σ2nI + C

∗Q∗1Q1C)−1. (3.12)

Then the error covariance of the constructed interference is

²X = σ2nQ2C(σ

2nI + C

∗Q∗1Q1C)−1C∗Q∗2. (3.13)

2. Decision-aided cancellation. The receiver makes �hard� decision on b to decode

the transmitted crosstalk signal in set S1, and constructs the interference signal

in set S2 based on the decision. The disadvantage is that a decision error would

worsen the impact on the constructed interference. The improvement can be

achieved by making �soft� decisions with extra computational complexity.

The Þrst approach works better if the transmitted crosstalk signal cannot be

reliably decoded. For example, the HDSL crosstalker signal includes the low-frequency

band [0−26 kHz], which is eliminated by the front-end Þlter of the ADSL receiver. Asa result, the transfer function for the crosstalk signal has a null response in this band,

which would produce many incorrect decisions if the crosstalk signal were decoded.

The decision-aided cancellation, however, works better if the interference to noise ratio

in set S1 is relatively high such that most of the decisions are correct. Inherently, this

approach takes advantage of the known discrete constellation of the crosstalk source

signal.

3.3.2 Geometrical Interpretation and Tone Selection

A natural question arises on how to select the best frequency bands to estimate the

crosstalk signal and to mitigate the interference in the other bands. The answers for

the two approaches above will be described separately in the following. The crosstalk

signal uses baseband transmission, therefore the signal at a negative frequency is a

conjugate of the counterpart at the positive frequency. For simplicity, this chapter

Page 67: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.3. CROSSTALK CANCELLATION 53

f

||c(f)||2Rb(f)

1/Tc-fo 1/Tcfo

A B

C

Figure 3.2: Crosstalk estimation and cancellation.

describes the method in the single-sided positive frequency band.

MMSE estimation and cancellation

The right strategy, which will be justiÞed later, is as follows:

1. calculate SINRs in frequencies fo and 1/Tc−fo, where Tc is the crosstalk signalsampling period;

2. estimate the crosstalk signal in the frequency bin that has a smaller SINR;

3. cancel the interference in the other bin that has the larger SINR.

In Figure 3.2, the solid curve shows the power spectral density (PSD) of the

crosstalk signal, with 100% excess bandwidth. The crosstalk signal is estimated in

the excess band and then used to cancel the interference in the main lobe (0, 1/2Tc).

The dotted curve AC shows the residual crosstalk PSD as a result of the crosstalk

Page 68: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

54 CHAPTER 3. CROSSTALK CANCELLATION

subtraction. If the smaller one of the interference to noise ratios in frequencies foand 1/Tc− fo is denoted by gs (the shaded zone in the Þgure), then the SINR gain infrequency fo is approximately equal to gs. Similarly, if the crosstalk signal is estimated

in the main lobe and used to cancel the interference in the excess band, the SINR

gain in frequency 1/Tc − fo is also approximately equal to gs. These statements willbe proved later in this subsection.

In fact, the gain is the same no matter which frequency, either fo or 1/Tc − fo,is used to estimate the crosstalk signal. However, the data rate increase is not the

same because it depends on the original SINR. For example, if the original SINR in

frequency 1/Tc − fo is −9 dB and the gain resulting from crosstalk cancellation is

also 9 dB, then the capacity is increased by about 0.5 bit/s/Hz; if the original SINR

in frequency fo is 10 dB and the gain is the same, then the capacity is increased by

about 1.5 bits/s/Hz. Therefore, the crosstalk signal should be estimated in frequency

1/Tc − fo and cancelled in frequency fo. Otherwise, the data rate improvement issmaller (0.5 b/s/Hz versus 1.5 b/s/Hz). This phenomenon could actually happen in an

ADSL environment. When the line reach is very long, the ADSL signal in the excess

band is weak compared to the NEXT signal, therefore, the crosstalk signal should be

estimated in the excess band and cancelled in the main lobe. Correspondingly, if the

primary signal has a smaller SINR in the main lobe for some reason (e.g., because of

the bridge tap), the crosstalk signal should be Þrst estimated in the main lobe and

cancelled in the excess band.

The following provides mathematically the rationale of the above statements.

The problem is easier to understand in the frequency domain instead of the matrix

representation in (3.11). The short-term Fourier transform (STFT) of the system

model in (3.1) is deÞned as

y(f) =1√MT

MTR0

y(t)e−j2πftdt

≈ p(f)a(f) + c(f)ej2πfτb(f) + n(f) (3.14)

where p(f) and c(f) are the normal frequency responses of p(t) and c(t), respectively.

The noise n(f) is a stochastic process, which is the STFT of �n(t). The variance of

Page 69: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.3. CROSSTALK CANCELLATION 55

n(f) is equal to its PSD, i.e., E(n(f)n∗(f)) = σ2n. The approximation in (3.14) is

due to the term of the crosstalk signal, because the crosstalk signal does not have

the cyclic preÞx and is not cyclostationary. This approximation is accepted for the

following three reasons. First, the approximation error is small if M is relatively

large and is exact asM →∞. Second, the analysis resulting from this approximationis used only for guidance to select the right frequency bins to observe the crosstalk

signal, not for the real crosstalk estimation. Third, this approximation makes the

analysis much more succinct and provides an intuitive explanation of the estimation

and cancellation process.

The primary and the crosstalk signals are

a(f) =1√MT

Pi

aie−j2πfTi,

b(f) =1√MT

Pk

bke−j2πfTck.

The crosstalk signal has the following property: b(f) = b∗(1/Tc − f), where Tc is thecrosstalk symbol period. Therefore, if the crosstalk component in frequency 1/Tc−fois observed, the interference component in frequency fo can be reconstructed.

In the following analysis, 0 < fo < 1/(2Tc) is assumed without loss of generality.

The crosstalk signal bk is assumed to be white and is uncorrelated with the primary

signal ai. For brevity, symbol fd denotes frequency 1/Tc − fo. The linear MMSEestimation of b(fd), given the observation y(fd), is

�b(fd) =c∗(fd)e−j2πfdτRb||c(fd)||2Rb + σ2n

(y(fd)− p(fd)a(fd)) (3.15)

where Rb = E(bkb∗k)L/(MT ) ≈ εb/Tc, and ||c(fd)||2Rb is the PSD of the transmittedcrosstalk signal at frequency fd. The reconstructed interference in frequency fo is

then

xc(fo) = c(fo)ej2πfoτ�b∗(fd). (3.16)

Page 70: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

56 CHAPTER 3. CROSSTALK CANCELLATION

The variance of the cancellation residual error plus the background noise is

σ2t (fo) = σ2n

||c(fo)||2Rb||c(fd)||2Rb + σ2n

+ σ2n. (3.17)

The original error variance without cancellation is

σ2x(fo) = ||c(fo)||2Rb + σ2n. (3.18)

Therefore, the SINR gain is equal to

Gain =σ2x(fo)

σ2t (fo)

= 1 +||c(fo)||2||c(fd)||2R2b

σ2n(||c(fo)||2Rb + ||c(fd)||2Rb + σ2n)(3.19)

= 1 +PSD(fo) · PSD(fd)

σ2n (PSD(fo) + PSD(fd) + σ2n)

(3.20)

where PSD(fo) is the interference PSD at frequency fo.

Proposition 1 Suppose the PSDs of the primary signal and the background noise

are Þxed. Given the dual frequencies fo and fd, the SINR gain by the MMSE esti-

mation and cancellation is the same no matter which frequency is used for crosstalk

estimation. However, with respect to the data rate improvement, the crosstalk should

be estimated in the frequency with a lower SINR and cancelled in its dual frequency.

Proof. The SINR gain in (3.20) is derived by estimating the crosstalk signal in

frequency fo and cancelling it in frequency fd. Since the SINR gain is symmetric with

respect to PSD(fo) and PSD(fd) as seen in (3.20), the same improvement in terms

of SINR is obtained if the crosstalk component in frequency fo is estimated Þrst and

the interference in frequency fd is cancelled next.

Page 71: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.3. CROSSTALK CANCELLATION 57

The data rate increase ∆R is

∆R = W log2

Ã1 + SINR·Gain

Γ

1 + SINRΓ

!

= W log2

Ã1 +

(Gain− 1)Γ

SINR+ 1

!(3.21)

where Γ is the gap [55] from the capacity and W is the subchannel bandwidth. The

data rate improvement ∆R is a monotonic increasing function of SINR. The higher

the original SINR is, the larger the data rate increase is. Therefore, the crosstalk

should be estimated in the frequency with a lower SINR and cancelled in the frequency

with a higher SINR. This is especially important when SINR is small in one frequency

and is large in its dual frequency.

Remark 1 There is one exception. In practical systems, there is a limit on the

maximum number of bits that can be transmitted in each bin. This is commonly

known as �bit cap�. If the higher SINR is originally so large that further gain in the

SINR cannot increase the date rate because of the bit cap, then the crosstalk signal

should be estimated in the bin with higher SINR and cancelled at it dual frequency.

The following example illustrates two important special cases for the SINR gain.

Example 4 (a) The interference levels are the same in the dual frequencies and

more than 10dB larger than noise, then the SINR gain is approximately

Gain ≈ PSD(fo)

2σ2n,

which is equal to the interference to noise ratio minus 3 dB.

(b) The interference levels have large disparity, for example, ||c(fo)||2 > 10||c(fd)||2,then the SINR gain is approximately

Gain ≈ PSD(fd)

σ2n

which is essentially equal to the interference to noise ratio of the smaller crosstalker.

Page 72: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

58 CHAPTER 3. CROSSTALK CANCELLATION

In the DSL systems, the crosstalk signals from ISDN, HDSL, or SDSL have a

large percentage of excess bandwidth. Therefore, the crosstalk signal can be estimated

Þrst in the excess band and then be used to cancel the interference in the main lobe.

The crosstalk in the excess band is generally smaller than in the main lobe, which

Þts case (b) in the above example. The SINR gain in the main lobe is equal to the

interference to noise ratio in the excess band. If there is no excess bandwidth, then

there is no SINR gain at all!

Decision-based Approach

For a given pair of the dual frequencies (fo and 1/Tc− fo), the best SINR gain by theMMSE approach above is equal to the smaller one of the interference to noise ratios

in these two frequencies. The decision-based approach could do better if the crosstalk

signal can be reliably detected. For example, if the crosstalk can be detected reliably

in the excess band, then all the interference in the main lobe can be eliminated,

as opposed to the residual interference (dotted line) shown in Figure 3.2. In this

approach, the best choices of the frequency bins for set S1 are those with large enough

interference to noise ratio for the reliable detection of the crosstalk signal. If there

are no such choices, the MMSE approach should be used instead.

3.3.3 Fast Computation

The crosstalk channel response is changing block over block because the crosstalk

signal and the primary signal have different sampling rates. Direct computation of

the linear MMSE estimation in (3.10) requires matrix inversion in every block. A fast

computation method is developed to avoid the large matrix inversion, with a slightly

degraded performance. This method is based on the well-known fact that the delay

in the time domain is equivalent to the phase shift in the frequency domain.

Denote C0 as the crosstalk function matrix with zero delay (τ = 0), then

Q1C ≈ Dτ ,1Q1C0 (3.22)

Page 73: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.3. CROSSTALK CANCELLATION 59

where Dτ ,1 represents the phase shift components of the channel response,

Dτ ,1 =

ej2π

k1N

τT 0 · · · 0

0 ej2πk2N

τT

. . ....

.... . . . . . 0

0 · · · 0 ej2πkmN

τT

.

where k1, . . . , km are the tone indices in set S1. The approximation in (3.22) is because

of the edge effect of the matrix. Asymptotically as M → ∞, the approximationbecomes an exact equation. The fractional delay τ is easy to infer block over block

because the sampling rates of the primary and crosstalk signals are both known.

With this approximation, the estimated signal can be simpliÞed as

b ≈ ΨD∗τ ,1z1 (3.23)

where Ψ is a constant matrix

Ψ = (C∗0Q∗1Q1C0 + σ

2nI)

−1C∗0Q∗1 (3.24)

which can be pre-computed and stored. This constant matrix avoids matrix inversion

and large matrix multiplications in each transmission block. The multiplicationD∗τ ,1z1

implies that the receiver adjusts the timing offset of the signal z1. Multiplying by the

constant matrix Ψ is roughly the same as passing the adjusted signal through a linear

MMSE Þlter. The reconstructed signal in (3.11) can also be simpliÞed as

Xc ≈ Dτ ,2ΦD∗τ ,1z1 (3.25)

where Φ is another constant matrix

Φ = Q2C0(C∗0Q

∗1Q1C0 + σ

2nI)

−1C∗0Q∗1 (3.26)

andDτ ,2 is similar toDτ ,1 except that it uses the tone indices of set S2 in the diagonal,

e.g., ej2πlN

τT , l ∈ S2. Similarly, the computational complexity is reduced dramatically

Page 74: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

60 CHAPTER 3. CROSSTALK CANCELLATION

because the constant matrix Φ can be pre-computed and stored.

3.3.4 Extension to Multiple Crosstalkers

The idea of estimating the crosstalk signal in one set of frequency bands and cancelling

it in another set of frequency bands can be extended to more than one crosstalker.

The system model remains the same as (3.8), but the crosstalk component QCb is

modiÞed slightly to include more crosstalkers, i.e.,

C = [C1, C2, . . . , Ck]

b = [b1,b2, . . . ,bk]T

where k is the number of the crosstalkers. The amount of performance improve-

ment depends on the crosstalkers� characteristics and the choice of the cancellation

approaches. The following example illustrates one particular approach of successive

cancellation of the crosstalk signals by estimating the crosstalk signals in the excess

band.

Example 5 The crosstalkers HDSL and 2080 kbps SDSL have single-sided bandwidth

of 192kHz and 520kHz. Both of them have about 100% excess bandwidth. Therefore,

SDSL can be estimated Þrst in frequency band [520 − 1040kHz] where the HDSLcrosstalker signal does not exist. Then the SDSL crosstalker can be cancelled in the

main lobe [138−520kHz]. After that, the same process is used to estimate and cancelthe smaller-bandwidth HDSL crosstalk.

3.4 Simulation Results

The ADSL downstream transmission is more vulnerable to NEXT than the upstream,

because the primary signal attenuates very rapidly while NEXT increases as frequency

increases. The simulations are thus concentrated on the downstream receiver on the

customer side. In current deployments, strong NEXT mainly comes from ISDN,

HDSL, SDSL, T1 or their repeaters. For a given line, there is very likely only one

Page 75: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.4. SIMULATION RESULTS 61

DSL ADSL HDSLLine code DMT 2B1Q

Sampling ratefo (ks/ sec)

2208 392

Power (dBm) 19.0 13.6

Duplexingup : 26− 138kHz

down : 138− 1104kHz Dual

Table 3.1: Main ADSL and HDSL Characteristics.

dominant crosstalk because of the following two reasons. First, the crosstalk line

should reside physically close to the victim line. Second, most services in the same

bundle are also ADSL. With the above two justiÞcations, the simulations assume

only one NEXT for a given line. It is thus also acknowledged that this technique may

not always provide large gain.

The main characteristics of ADSL and HDSL are summarized in Table 3.1. For

more information, refer to [2][3] and the references therein. SDSL [29] has the same

characteristic as HDSL except that it offers variable symmetric data rate. The single-

sided PSD of SDSL and HDSL is typically

PSD(f) = K · 2

fsymsin c2

µπf

fsym

¶1

1 +³

f240392

fsym

´8 (3.27)

Watts/Hz, where fsym is the symbol rate andK = 592.72

135. The PSD includes a 4th order

lowpass butterworth Þlter whose 3 dB attenuation occurs at frequency 240fsym/392.

For HDSL, fsym = 392 kHz and f3dB = 240 kHz (see 2). The NEXT coupling

functions are taken from real measured data. Figure 3.3 shows several dominant

NEXT coupling magnitude functions for a given line. The thickest line in the Þgure

is used here for simulation. The crosstalk transfer function is then a cascade response

of the rectangular pulse, the butterworth Þlter, the NEXT coupling function, and the

receiver lowpass Þlter. A linear phase is assumed in the NEXT coupling function.

The system parameters used to calculate the ADSL downstream data rate are

2In the original ADSL test procedures as speciÞed in ITU-T G.996.1 Recommendations, f3dB =192kHz. This number has been changed in [29] to 240kHz for greater accuracy.

Page 76: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

62 CHAPTER 3. CROSSTALK CANCELLATION

0 0.5 1 1.5 2-110

-100

-90

-80

-70

-60

-50Measured NEXT Attenuation

Frequency (MHz)

Atte

nuat

ion

in d

B

Figure 3.3: Measured NEXT coupling for a given line.

Page 77: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.4. SIMULATION RESULTS 63

ADSL line type: 26 GaugeAWGN (single-sided): −140 dBm/HzSystem margin: 6 dBCoding gain: 3 dBSNR-gap: Γ = 9.5 dB# of self-FEXT: 24

Table 3.2: ADSL system parameters for data rate calculation.

summarized in Table 3.2. The upstream and downstream bands for ADSL are shown

in Table 3.1. The total noise for the data rate computation is the sum of background

noise, 24 FEXT from ADSL services by the standard model [53], and one dominant

NEXT from HDSL or SDSL.

3.4.1 HDSL NEXT Cancellation

HDSL has a relatively small bandwidth with respect to the ADSL signal. The

crosstalk is estimated and cancelled by the approaches proposed in Section 3.3.1.

Figure 3.4 shows three PSDs which correspond to the original NEXT, the residual

NEXT using the decision-aided cancellation approach, and the residual NEXT using

the MMSE estimation and cancellation approach. The crosstalk signal is observed in

the HDSL excess band [198 − 250 kHz] and cancelled in the main band [142 − 194kHz]. In the observing band, the interference is treated as a Gaussian noise for the

detection of the primary signal and no improvement has been achieved. However,

in the main lobe [142 − 194 kHz], the improvement by the MMSE estimation andcancellation is very large as shown in Figure 3.4, which is about +30 dB. This result

Þts very well with the analysis and geometric interpretation of the crosstalk cancel-

lation in Section 3.3.2. As expected in Example 4, the SINR gain in frequency 194

kHz is approximately equal to the interference to noise ratio in the dual frequency

198 kHz minus 3 dB. If self-NEXT from other ADSL services in the upstream band

[26−138 kHz] is small (this Þgure assumes no self-NEXT), the HDSL crosstalk signalcan also be estimated in the ADSL upstream band and then cancelled in the dual

HDSL excess band [254 − 366 kHz]. The interference in the excess band [254 − 366

Page 78: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

64 CHAPTER 3. CROSSTALK CANCELLATION

50 100 150 200 250 300 350-145

-140

-135

-130

-125

-120

-115

-110

-105

-100

Frequency (kHz)

dBm

/Hz

HDSL NEXT Cancellation

AWGN

Original NEXTDecision-aidedMMSE

Figure 3.4: HDSL NEXT estimation and cancellation.

kHz] can be almost eliminated because the crosstalk signal in band [26 − 138 kHz]has a much larger interference to noise ratio.

Interestingly, the MMSE estimation and cancellation technique works much bet-

ter than the decision-aided technique for the HDSL crosstalker. The direct cause

is that the HDSL signal are not detected reliably enough, and the wrong decisions

double the negative impact on the cancellation residual error. The decoding error is

mainly because the HDSL crosstalk signal in the voice band [0-26kHz] is lost after it

passes the ADSL receiver Þlter. The problem is even worse when the HDSL signal

can not be estimated in the ADSL upstream band [26− 138 kHz] if self-NEXT fromADSL are stronger than the HDSL signal.

Figure 3.5 shows the ADSL downstream data rate improvement as a result of the

MMSE crosstalk estimation and cancellation. Given a line length of 4500 m, the data

rate increases from 0.8 Mbps to 1.7 Mbps. It is also interesting to note that, given

Page 79: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.4. SIMULATION RESULTS 65

3000 3500 4000 4500 5000 5500 60000

1

2

3

4

5

6

Loop Length (m)

Mbp

s

ADSL Downstream Data Rate

Without cancellationWith cancellation

Figure 3.5: Downstream data rates with/without NEXT cancellation.

Page 80: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

66 CHAPTER 3. CROSSTALK CANCELLATION

200 400 600 800 1000-145

-140

-135

-130

-125

-120

-115

-110

-105

-100

Frequency (kHz)

dBm

/Hz

SDSL NEXT CancellationOriginal NEXTDecision-aidedMMSE

Figure 3.6: SDSL NEXT estimation and cancellation.

the data rate of 0.8 Mbps, the line reach increases from 4500 m to 5300 m, which is

about 39% more coverage area for the service providers.

3.4.2 SDSL NEXT Cancellation

SDSL offers variable symmetric data rates by using different bandwidth. In the

simulation, the symbol rate is chosen as fsym = 1040 kHz. Three PSDs of the SDSL

NEXT are shown in Figure 3.6. They correspond to the original NEXT, the residual

NEXT using the decision-aided cancellation approach, and the residual NEXT using

the MMSE cancellation approach, respectively. The crosstalk signal is estimated in

Page 81: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.4. SIMULATION RESULTS 67

the SDSL excess band [522−902 kHz] and cancelled in the dual main lobe [138−518kHz]. The improvement is very large in those frequency band around fsym/2 where

the excess band has very high interference to noise ratio. As the frequency increases

towards fsym, the crosstalk signal becomes small, correspondingly the improvement of

the cancellation in the dual frequency band becomes small. As shown in Figure 3.6,

the improvement of SINR is smaller in the bands closer to the minimum downstream

frequency (138 kHz). If the self-NEXT from other ADSL services are small, the

crosstalk signal can be estimated in the ADSL upstream band [26 − 138 kHz] andcancelled in the dual excess band [904− 1014 kHz].

The MMSE estimation and cancellation approach performs better than the de-

cision aided approach. However, the difference from these two approaches is smaller

than that of the HDSL service. The reason is that the SDSL service has a much larger

bandwidth than the HDSL service and the loss of the signal in the low-frequency band

[0− 26 kHz] has a relatively smaller effect on the decoding error.The ADSL data rate improvement is shown in Figure 3.7. The improvement is

most signiÞcant in the loops around 2500 m −4500 m. The improvement is smallerin the shorter loop (< 2500 m) because the self-FEXT are larger. Given a line length

of 3500 m, the data rate increases from 0.9 Mbps to 2.7 Mbps. Similarly, for a given

data rate of 0.9 Mbps, the loop length increases from 3500 m to 4600 m, which is

about 73% more area coverage for a service provider. The SDSL NEXT is very severe

crosstalk to the ADSL downstream transmission because it has a large bandwidth.

The cancellation method proposed in this chapter can greatly improve the system

performance if there is one (dominant) NEXT.

3.4.3 Fast Computation

One important aspect of the proposed techniques is that there exists a fast computa-

tional scheme, which may be used for practical implementation. This fast algorithm

degrades the system performance because of the edge effect in the crosstalk function

matrix as described in Section 3.3.3. Figures 3.8 and 3.9 show the NEXT cancellation

results for HDSL and SDSL, respectively. The three PSDs correspond to the original

Page 82: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

68 CHAPTER 3. CROSSTALK CANCELLATION

2000 2500 3000 3500 4000 4500 5000 55000

1

2

3

4

5

6

7

8

Loop Length (m)

Mbp

s

ADSL Downstream Data Rate

Without SDSL cancellationWith SDSL cancellation

Figure 3.7: Downstream data rates with/without SDSL NEXT cancellation.

Page 83: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.5. CONCLUSIONS 69

50 100 150 200 250 300 350-145

-140

-135

-130

-125

-120

-115

-110

-105

-100

Frequency (kHz)

dBm

/Hz

HDSL NEXT CancellationOriginal NEXTMMSEMMSE_fastComp

Figure 3.8: HDSL NEXT cancellation using the fast algorithm.

NEXT, the residual NEXT by the fast algorithm, and the residual NEXT by the

accurate MMSE estimation and cancellation in Section 3.3.1. The simulation results

show that the SINR loss due to the fast algorithm is relatively small.

3.5 Conclusions

The crosstalk from other types of services, such as HDSL, SDSL, and T1, limits the

data rate or the line reach of an ADSL service. This chapter presented two new

methods to mitigate such NEXT. Both methods are based on the idea of estimating

the crosstalk signal in some frequency bands and canceling it in other frequency bands.

The decision-aided method decodes the crosstalk signal based on the observation

Page 84: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

70 CHAPTER 3. CROSSTALK CANCELLATION

200 400 600 800 1000-145

-140

-135

-130

-125

-120

-115

-110

-105

-100

Frequency (kHz)

dBm

/Hz

SDSL NEXT CancellationOriginal NEXTMMSEMMSE_fastComp

Figure 3.9: SDSL NEXT cancellation using the fast algorithm.

Page 85: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

3.5. CONCLUSIONS 71

in some frequency bands. The crosstalk signal is then reconstructed and cancelled

in other bands. The method has the problem of error propagation. The MMSE

estimation and cancellation method does not decode the crosstalk signal, but uses the

MMSE estimation result directly to construct the interference and cancel it in other

frequency bands. The latter approach is particularly better to suppress one HDSL or

SDSL NEXT because the decision-aided approach can not decode the crosstalk signal

reliably due to high attenuation and the signal loss in the low-frequency band [0− 26kHz]. This conclusion is veriÞed by the simulation results.

This chapter also presents an intuitive explanation of crosstalk cancellation,

which provides the guidance to select the right frequency bands to estimate the

crosstalk signal. One interesting result of the MMSE estimation and cancellation

is that the gain from interference suppression is the same no matter if the crosstalk

signal is estimated in the main lobe or in the excess band. In general, the main lobe

has larger interference than the excess band. Therefore, if the crosstalk signal is esti-

mated in the main lobe, the interference caused by the excess band can be eliminated.

Conversely, if the crosstalk signal is estimated in the excess band, the SINR gain in

the main lobe is equal to the interference to noise ratio in the excess band. The larger

the interference in the excess band, the better the suppression of the interference in

the main lobe.

Moreover, a fast computational algorithm was developed for practical implemen-

tation with slightly degraded performance. This method avoids matrix inversion and

large matrix multiplication in every transmission block. In contrast, the traditional

MMSE estimation requires high computational complexity since the crosstalk signal

is non-stationary and large matrix inversion is needed in every transmission block.

In conclusion, the MMSE estimation and cancellation scheme is very effective in

cancelling the crosstalk if the crosstalk has a large percentage of excess bandwidth.

In current DSL systems, NEXT into an ADSL receiver has a large excess bandwidth,

therefore this method is very effective to cancel one dominant NEXT.

Page 86: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Chapter 4

Multiuser Water-Þlling Algorithms

4.1 Introduction

In a multiaccess channel (MAC), several transmitters (users) send information to a

common receiver. The capacity region of a memoryless Gaussian MAC is described in

[56]. The capacity region of a Gaussian MAC with intersymbol interference (ISI) has

been studied in [57] [58]. To obtain the optimal transmit power spectral density (PSD)

explicitly for each user, Cheng and Verdu [59] studied a two-user scalar GaussianMAC

that is linear and time invariant. The Gaussian MAC is shown in Figure 4.1, where

both the inputs and the outputs are scalar and the channel seen by each user is

independent and time invariant. In [59], Cheng and Verdu extended the well-known

single-user water-Þlling method [60] to the two-user MAC and derived the optimal

transmit PSDs for each user. In [61], Tse proposed a generalized formulation of the

capacity region of a MAC with an arbitrary number of the users.

Although the optimal transmit PSDs can be expressed mathematically in [59]

[61], no prior work has been reported to compute them efficiently and to obtain

the capacity region of a two-user Gaussian MAC with ISI. Previously, Diggavi [62]

proposed an algorithm to calculate the optimal PSDs for a situation where two users

have the same priorities. This special case corresponds to one point on the boundary of

the capacity region. Yu [63] investigated the two-user rate region under the constraint

of frequency division multiaccess (FDMA) between two users.

72

Page 87: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.1. INTRODUCTION 73

G1(ω)

G2(ω)

+ +

nx1

x2

Figure 4.1: Two-user Gaussian multiaccess channel.

This chapter describes three new water-Þlling algorithms. The Þrst algorithm

is developed for a two-user channel where both users have the same priority and is

more computationally efficient than Diggavi�s [62]. The second algorithm is for a

Gaussian MAC with K > 2 users where all users have the same priorities. The third

algorithm is developed for a general two-user scenario where two users have different

priorities. By changing the priority of different users, we can obtain the boundary of

the capacity region for the two-user channel. These three algorithms were previously

presented at two conferences [34][35].

Using the gap approximation [55], we can directly apply our algorithms to Dis-

crete Multitone (DMT) modulated systems [13] [10] [11] of Gaussian MACs to obtain

the optimal transmit PSD for each user if all users have the same priorities. In DMT

systems, these types of algorithms are more commonly known as �loading algorithms�

[64].

The chapter is organized as follows. Section 4.2 reviews the previous work by

Cheng and Verdu on the mathematical expressions of the optimal PSDs in a frame-

work that is convenient for later algorithm development. Section 4.3 then describes

new algorithms to Þnd the optimal transmit PSDs for a Gaussian MAC. Simulation

results are described in Section 4.4 to demonstrate the efficiency of our algorithms.

Section 4.5 summarizes the chapter.

Page 88: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

74 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

ω

cP

g-1(ω)

Figure 4.2: Water-Þlling diagram for a single user channel.

4.2 Prerequisite

This section brießy reviews the previous work [59] on the optimal transmit PSDs for a

Gaussian multiaccess channel. For a single user, the optimal PSD S(ω) is the unique

solution to the following equations:

S(ω) = [c− g−1(ω)]+, (4.1)

P =1

π

Z π

0

S(ω)dω, (4.2)

where P is the total power constraint and g(ω) = |H(ω)|2 /N(ω) is the magnitudesquare of the channel transfer function over the noise PSD. The �+� sign in (4.1)

indicates that S(ω) ≥ 0. The geometrical interpretation of the above equations (4.1)(4.2) is shown in Figure 4.2 and known as �water-Þlling� scheme [60], where the

bottom of the �container� is g−1(ω) and the �water� level is Þlled to c. The total

amount of �water� is equal to the power P.

For a two-user channel, the capacity region can be described as

C = {(R1, R2) ∈ IR2+ : αR1 + (1− α)R2 ≤ C(α),∀α ∈ [0, 1]} (4.3)

where R1 and R2 are data rates of user 1 and 2, respectively, subject to individual

power constraints. C(α) is the maximum value for a given α. The boundary of the

Page 89: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.2. PREREQUISITE 75

capacity region consists of those points that satisfy the equality in (4.3). The variable

α can be interpreted as a priority factor for the two users. If α > 0.5, user 1 has

higher priority and vice versa.

The optimal PSDs for the two users are needed in order to achieve the boundary

of the capacity region. For the special case of equal priorities where α = 0.5, it has

been shown [59] that the optimal PSDs for the two users are:

Sk(ω) =�Sk(ω)

bk(4.4)

�Sk(ω) =

([1− bkg−1k (ω)]+, ω ∈ Ik0, otherwise

(4.5)

where k = 1, 2 and the frequency bands Ik are disjoint and assigned with the following

requirements:

I1 : b1g−11 (ω) ≤ b2g−12 (ω)

I2 : b2g−12 (ω) ≤ b1g−11 (ω) (4.6)

The scaling factors bk are chosen to satisfy the following constraint:

1

π

Z π

0

�Sk(ω)dω = bkPk, k = 1, 2 (4.7)

where Pk is the power constraint for each individual user. The optimal PSDs are

achieved by frequency-division multiple access (FDMA) according to (4.5). Figure

4.3 shows the water-Þlling scheme for the two-user MAC with equal priorities. The

graphical interpretation of the above equations is as follows. Both users� channel

characteristics g−1k (ω) are scaled by a pair of scaling factors bk, k = 1, 2, respectively.

The scaled channel characteristics are equivalent to the original channels but with

different power constraints bkPk. This equivalent channel idea allows the two separate

water-Þlling diagrams to be combined into a single water-Þlling diagram with the same

water level using proper scaling factors bk. By arbitrarily Þxing the water-Þlling level

for both users to 1, the scaling factors b1, b2 are adjusted until the total amount

Page 90: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

76 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

1

b1g1-1(ω)

b2g2-1(ω)

b2P2b1P1

Figure 4.3: Water-Þlling diagram for two users with equal priorities.

of water in the region where b1g−11 (ω) < b2g−12 (ω) is equal to b1P1, and likewise for

user 2. Effectively, the equivalent channel idea has transformed the 2-user system

into a single-user system whose inverted channel-to-noise curve is the minimum of

the two curves, b1g−11 (ω) and b2g−12 (ω), onto which a total amount of water equal

to b1P1 + b2P2 is poured. Each user then occupies the frequency band(s) where its

channel characteristic bkg−1k (ω) is smaller. This water-Þlling method can be extended

similarly to a system of more than two users with equal priorities, which will be

described more in Subsection 4.3.2.

When two users are assigned different priorities (α 6= 0.5), the optimal PSD [59]is

Sk(ω) =�Sk(ω)

bk, k = 1, 2 (4.8)

where bk > 0 and if α ∈ (0.5, 1],

�S1(ω) =

[α− b1g−11 (ω)]+, if ω ∈ I1[α− b1g−11 (ω)]+ − �S2(ω), if ω ∈ I20, if ω ∈ I3

(4.9)

�S2(ω) =

0, if ω ∈ I1[1− α− b2g−12 (ω) · 2α−1

b1g−11 (ω)−b2g

−12 (ω)

]+, if ω ∈ I2[1− α− b2g−12 (ω)]+, if ω ∈ I3

. (4.10)

Page 91: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.2. PREREQUISITE 77

α

b1g1-1(ω)

b2g2-1(ω) + 2α - 1

b1P1

I1 I2 I3

b2P2

A

B

Figure 4.4: Water-Þlling diagram for two users with different priorities (α > 0.5).

where the frequency bands I1, I2, I3 are disjoint and are characterized respectively by

I1 : b1g−11 (ω) ≤ b2g−12 (ω) (4.11)

I2 : b2g−12 (ω) < b1g

−11 (ω) ≤ b2g−12 (ω) + 2α− 1 (4.12)

I3 : b1g−11 (ω) > b2g

−12 (ω) + 2α− 1 (4.13)

and �Sk(ω) should satisfy the individual power constraint:

1

π

Z π

0

�Sk(ω)dω = bkPk, k = 1, 2 (4.14)

For brevity, the optimal PSD formulas for α ∈ [0, 0.5) are not given here but can bederived by exchanging the roles of the two users.

Figure 4.4 shows the water-Þlling scheme for the two-user MAC scenario with

unequal priorities (α > 0.5). The water level is Þxed at α. The bottom of the container

for user 1 is still b1g−11 (ω) and the bottom of the container for user 2 is shaped by

b2g−12 (ω) + 2α− 1. Since user 1 has higher priority, it occupies some frequency band

(I2) that would have been assigned to user 2 should the two users have equal priorities.

There are three frequency bands (I1, I2, I3) in the Þgure. Only user 1 occupies the

frequency band I1 that is to the left side of point A, as b1g−11 (ω) ≤ b2g−12 (ω). Two

users share the frequency band I2 that is between points A and B. Finally, only user

2 occupies the frequency band I3 that is to the right side of point B. Note that an

Page 92: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

78 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

FDMA scheme cannot achieve the optimal PSDs in the Gaussian MAC with unequal

priorities. In region I2, the sum of the PSDs for both users is equal to [α−b1g−11 (ω)]+,which is the height from the bottom (curve AB) to the water level. The bottom of

the container (the dashed line in Figure 4.4) of user 2 in region I2 is reshaped as

B2(ω) = b2g−12 (ω)

2α− 1b1g

−11 (ω)− b2g−12 (ω)

+ 2α− 1≥ b2g

−12 (ω) + 2α− 1

≥ b1g−11 (ω). (4.15)

The inequalities follow from the deÞnitions of I2 in (4.12). Within the frequency band

I2, the optimal PSD for user 2 is �S2(ω) = [α−B2(ω)]+, and the optimal PSD for user1 is �S1(ω) = [α− b1g−11 (ω)]+ − �S2(ω). Although the optimal PSDs can be expressed

mathematically, it is still difficult to Þnd the right scaling factors b1, b2 to compute

the PSDs numerically.

4.3 Multiuser Water-Þlling Algorithms

This section describes new and efficient algorithms to Þnd the scaling factors bk for

computing the optimal transmit PSDs for different scenarios. We assume the channel

characteristics g−1k (ω) are sampled and thus the digital channel characteristics g−1k (i),

i = 1, . . . , N, are used in the rest of the chapter. In a DMT system, N corresponds

to the number of subcarriers. The algorithm for two users with equal priorities is an

exact solution and has a computational complexity of O(N log2N), which is lower

than Diggavi�s [62] O(N2) complexity. For K > 2 users with equal priorities, the

known optimal algorithm has a complexity of O(N (K−1)K/2) [62], which is impractical

to compute when K is large. This motivates derivation of a new heuristic algorithm,

which has a computational complexity of approximately O(K2N log2N) and still

achieves data rates of more than 98% of the capacity in all the channels simulated.

Finally an exact algorithm is developed for the two-user channel with unequal priori-

ties. This algorithm has an approximate complexity of O(N log2N) but with a larger

constant than that of the equal-priority case. Using this algorithm, the boundary of

Page 93: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.3. MULTIUSER WATER-FILLING ALGORITHMS 79

the Gaussian MAC capacity region can be obtained by tracing the priority factor α

from 0 to 1.

4.3.1 Equal Priority : max(R1 +R2)

In Section 4.2, the optimal PSDs for two users with equal priorities can be achieved

through FDMA. Correspondingly, the discrete optimal PSDs of the two users are

�S1(i) =

([1− b1

g1(i)]+, i ∈ I1

0, i ∈ I2(4.16)

�S2(i) =

(0, i ∈ I1[1− b2

g2(i)]+, i ∈ I2

(4.17)

where I1 and I2 are disjoint frequency bands with the following requirements:

I1 :b1

g1(i)≤ b2

g2(i), I2 :

b2

g2(i)≤ b1

g1(i),

I1 ∪ I2 = {1, 2, . . . , N}. (4.18)

The scaling factors bk(k = 1, 2) should also satisfy the power constraints:

Xi∈I1

[1− b1g1(i)

]+ − b1P1 = 0 (4.19)

Xi∈I2

[1− b2g2(i)

]+ − b2P2 = 0 (4.20)

Remark 2 The inverse channel characteristics g−1k are scaled by bk and the water

level is Þxed at 1. Each user can occupy only the frequency bands where its scaled

inverse channel characteristics bkg−1k (i) are the smallest (Figure 4.3). The optimal

scaling factors (b1, b2) need to satisfy the power constraints in (4.19) and (4.20).

Page 94: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

80 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

Without loss of generality, we assume the ratio of the channel characteristics

r(i) = g1(i)/g2(i) has been sorted in a descending order, i.e.,

g1(1)

g2(1)≥ g1(2)

g2(2)≥ · · · ≥ g1(N)

g2(N). (4.21)

In the FDMA Gaussian MAC scenario, two users are competing for the frequency

bands. If subcarrier k is assigned to user 1 (b1g−11 (k) ≤ b2g−12 (k)), then the subcarrierswith indices less than k must also be assigned to user 1 because it has a relatively

better channel characteristic (after scaling) than user 2 (b1g−11 (i) ≤ b2g−12 (i), i < k).Therefore the frequency bands of the optimum solution must have the following forms:

I1(k) ∈ {1, 2, . . . , k}I2(k) ∈ {k + 1, . . . , N}. (4.22)

where 1 ≤ k ≤ N . The objective now is to Þnd the optimal partition kopt, which

satisÞes (4.18), (4.19) and (4.20).

Theorem 2 : If the scaling factors b1 and b2 satisfy (4.19) (4.20) with the frequency

bands shown in (4.22), then the ratio of the scaling factors b1(k)/b2(k) is an increasing

function of the variable k.

Proof. (1) b1(k) is an increasing function of the variable k. To see this, we rewrite

(4.19) as Xi∈I1(k)

[1

b1(k)− 1

g1(i)]+ = P1. (4.23)

When k increases, I1 includes more subcarriers. Therefore the water level 1/b1(k)

should go down since the bottom of the �container� 1/g1(i) is Þxed. Mathematically,

a smaller 1/b1(k) is needed to satisfy (4.23). In other words, b1(k) ≤ b1(k + 1).(2) b2(k) is a decreasing function of the variable k. When k increases, I2 includes

less subcarriers and the water level 1/b2(k) should go up. Therefore, a larger 1/b2(k)

is needed to satisfy (4.20), which implies b2(k) ≥ b2(k + 1).Thus, b1(k)/b2(k) increases with the variable k.

Page 95: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.3. MULTIUSER WATER-FILLING ALGORITHMS 81

1 N

g1(i)/g2(i)

A

b1(i)/b2(i)

i

Figure 4.5: Two curves representing functions g1(i)/g2(i) and b1(i)/b2(i), respectively.

Given a frequency partition as shown in (4.22), the scaling factors b1(k), b2(k)

can always be calculated by the power constraints in (4.19) and (4.20). However,

there is only one pair of scaling factors that correspond to the optimal solution, i.e.,

satisfy the requirements in (4.18). Figure 4.5 shows the functions of r(i) = g1(i)/g2(i)

and b1(i)/b2(i), where r(i) is a decreasing function while b1(i)/b2(i) is an increasing

function. The intersection point A corresponds to the optimal partition and can be

found using the binary search technique because both functions are monotonic. The

algorithm is as follows:

Load2User(g1, g2, P1, P2, I)

1. left = 1,right = N

2. while (right − left> 0)

(a) k = b(left + right)/2c(b) Calculate the scaling factors b1(k) and b2(k) from (4.19)(4.20)

(c) if (r(k) ≥ b1(k)/b2(k) ≥ r(k + 1)) break(d) else if (b1(k)/b2(k) > r(k)) right = k

(e) else if (b1(k)/b2(k) < r(k + 1)) left = k + 1

3. kopt = k, b1 = b1(kopt), b2 = b2(kopt)

Page 96: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

82 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

4. I1 = {1, 2, . . . , kopt}, I2 = {kopt + 1, . . . , N}

5. Calculate PSDs from (4.16) and (4.17)

6. return b1, b2, I1, I2

This algorithm searches at most log2N partitions due to the binary search. For

each partition, it takes O(N) to calculate the scaling factors b1 and b2. Therefore, the

total complexity of this algorithm is O(N log2N). In contrast, Diggavi�s approach

must search all N points and each point takes O(N), resulting in a complexity of

O(N2).

4.3.2 K Users : max(R1 +R2 + · · ·+RK)

We Þrst study a three-user channel to gain some insight into this problem and then

extend our algorithm to K users. The discrete optimal PSDs for three users are

�Sk(i) =

([1− bk

gk(i)]+, i ∈ Ik

0, i /∈ Ik(4.24)

where k = 1, 2, 3, and Ik are disjoint frequency bands which satisfy:

I1 :b1g1(i)

≤ minµb2g2(i)

,b3g3(i)

¶,

I2 :b2g2(i)

≤ minµb1g1(i)

,b3g3(i)

¶,

I3 :b3g3(i)

≤ minµb1g1(i)

,b2g2(i)

¶,

I1 ∪ I2 ∪ I3 = {1, 2, . . . , N}. (4.25)

Page 97: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.3. MULTIUSER WATER-FILLING ALGORITHMS 83

The scaling factors bk (k = 1, 2, 3) should satisfy the power constraints:

Xi∈I1

[1− b1g1(i)

]+ − b1P1 = 0, (4.26)

Xi∈I2

[1− b2g2(i)

]+ − b2P2 = 0, (4.27)

Xi∈I3

[1− b3g3(i)

]+ − b3P3 = 0. (4.28)

If we combine (4.27) and (4.28) together, we get

Xi∈I2,I3

·1− 1

max(g2(i)/b2, g3(i)/b3)

¸+− (b2P2 + b3P3) = 0. (4.29)

This equation leads us to treat user 2 and user 3 as a �new� single user, which has a

new channel characteristic and power constraint as follows:

h(i) = max(g2(i)/b2, g3(i)/b3), (4.30)

W2 = b2P2 + b3P3. (4.31)

Then the problem is simpliÞed to the two-user case and algorithm Load2User can

be directly applied. After water-Þlling, the frequency bands I1 for user 1 is Þxed

and algorithm Load2User is applied again to load user 2 and user 3 in the remaining

frequency bands. These two steps are repeated until a sufficiently good result is

obtained. The basic steps are:

1. h(i) = max(g2(i), g3(i)), W2 = P2 + P3

2. Load two users g1(i) and h(i) using Alg. Load2User . We get the scaling factor

b1 and two disjoint frequency bands I1 and I23.

3. Load user 2 and user 3 in the frequency bands I23 using Alg. Load2User . We

get the scaling factor b2 and b3.

4. gk(i) = gk(i)/bk, Pk = bkPk, k = 1, 2, 3

Page 98: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

84 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

1

b1g1-1(ω)

b2g2-1(ω)

b1P1

b3g3-1(ω)

b2P2 b3P3

“New User”

Figure 4.6: Water-Þlling diagram for three users.

5. Go back to Step 1.

Figure 4.6 illustrates the above steps. Note that the scaling factors bk could

violate the constraint in (4.25) and thus the solution is suboptimal. In other words,

some users may occupy those frequency bands that are not the best for them. In

order to know how close this solution is to the optimal, we derive an upper bound to

the capacity in the following. The capacity of a 3-user channel is (for clarity, we omit

the power constraints for Sk, �Sk and �S in the following equations)

C = maxSk

1

2

NXi=1

log2

Ã1 +

3Xk=1

Sk(i)gk(i)

!(4.32)

= max�Sk

1

2

NXi=1

log2

Ã1 +

3Xk=1

�Sk(i)gk(i)

bk

!(4.33)

≤ max�S

1

2

NXi=1

log2

µ1 + �S(i) max

k=1,2,3(gk(i)

bk)

¶(4.34)

= Cupper, (4.35)

where k and i are user and subchannel indices respectively, and �S(i) is the sum of

PSDs given by

�S(i) =3Xk=1

�Sk(i). (4.36)

Page 99: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.3. MULTIUSER WATER-FILLING ALGORITHMS 85

Cupper is the upper bound to the capacity and can be calculated by the single-user

water Þlling method:

�S(i) = [l − mink=1,2,3

bkg−1k ]

+, (4.37)

NXi=1

�S(i) =3Xk=1

bkPk. (4.38)

Therefore, for any scaling factors bk (k = 1, 2, 3), we can calculate the upper bound

Cupper to the capacity using (4.34)(4.37)(4.38).

Remark 3 If the scaling factors bk satisfy the constraints in (4.25), then the upper

bound is achieved and represents the real capacity. In this optimal solution, only the

user with the maximum value of gk(i)/bk can use subchannel i and all other users�

PSDs are equal to 0 in this subchannel. So the equality holds in (4.34).

For a given set of the scaling factors bk, we can also calculate the achievable data

rates by

Rk =1

2

Xi∈Ik

log2

µ1 + �Sk(i)

gk(i)

bk

¶, k = 1, 2, 3, (4.39)

where �Sk(i) is each individual user�s PSD that is obtained from (4.24). In the practical

algorithm, when R1 + R2 + R3 is close enough to the upper bound of the capacity

Cupper, we can stop iterating and exit. The following is a water-Þlling algorithm for

three users.

Load3User(g1, g2, g3, P1, P2, P3, I)

1. ite = 1

2. While (ite ≤ max_ite)

(a) h = max(g2, g3),W = P2 + P3, ite = ite+1

(b) [b1, b23, I1, I23] = Load2User(g1, h, P1,W, I)

(c) [b2, b3, I2, I3] = Load2User(g2,g3,P2,P3,I23)

Page 100: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

86 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

(d) Calculate Cupper and R =P3

k=1Rk. If R/Cupper > target_ratio, break

(e) gk = gk/bk, Pk = bkPk, k = 1, 2, 3

3. Calculate PSD Sk

4. return Ik, Sk, k = 1, 2, 3

In this algorithm, the parameter max_ite is the maximum number of iterations

and target_ratio is the desired ratio of the achieved data rate over the capacity.

Simulations show that this algorithm is very efficient and needs only 2 or 3 iterations

to get a target_ratio of 99% on most multiaccess channels. However, this algorithm

can not guarantee that the optimal solution is achieved. So if target_ratio is set too

high (for example, 99.99%), it may not be able to achieve the ratio and the algorithm

will exit after a maximum number of iterations.

Next, we extend our algorithm toK users. The idea is that user 2,user 3, . . . , user

K are collectively bunched together as a �new user�, effectively reducing the K-user

problem to a 2-user problem for which Alg. Load2User directly applies. Next, with

the subchannels assigned to user 1 Þxed, the same approach is applied recursively to

User 2,User 3, . . . , User K over the rest of the subchannels. After these two steps,

we obtain the scaling factor bk for each user. In the third step, we scale the channel

characteristic gk by b−1k and consider it as the new channel characteristic. In other

words, User k now has the channel characteristic �gk = gk/bk and the power constraint�Pk = bkPk. Then, we repeat the Þrst two steps with the new channel characteristics

�gk and power constraints �Pk for all users until the data rate is close to the capacity.

The Þrst two steps are summarized in the following subroutine that is used later by

a water-Þlling algorithm for K users:

Load(G,P, I,K)

1. if (K = 2)

(a) [b(1:2), I(1:2)] = Load2User(G(1:2),P (1:2),I)

(b) return b, I

Page 101: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.3. MULTIUSER WATER-FILLING ALGORITHMS 87

2. h = max(G(2), G(3), . . . , G(K)),W = P (2) + P (3) + . . .+ P (K)

3. [b(1), b2_new, I(1), I2_new] = Load2User(G(1),h,P (1),W ,I)

4. F = G(2 : K), PP = P (2 : K)

5. [b(2 : K), I(2 : K)] =Load(F, PP, I2_new,K − 1)

6. return b, I

In this subroutine, the inputs G,P are vectors containing the channel character-

istics and power constraints for each individual user. For example, G(2) represents

user 2�s channel characteristics and P (2) represents user 2�s total power constraint.

The input I is the set of the interested frequency band, which is {1, 2, . . . , N} for allthe users. The input K is the number of users. The outputs of this subroutine are

the scaling factors b and the frequency bands I for different users.

This subroutine is recursive since it calls itself in Line 5. Line 1 checks the

number of users. Line 2 sets the initial conditions by treating all other users as a

single �new� user. Line 3 applies Alg. Load2User to load user 1 and the new user.

Line 5 recursively calls itself with K − 1 users and the new frequency bands I2_new.This subroutine has a complexity of O(KN log2N).

Now we introduce the water-Þlling algorithm that calls the above subroutine

several times to achieve the near optimal solution.

LoadKUser(G,P, I,K)

1. fac(1 : K) = 1

2. for ite = 1 : max_ite

(a) [b, Inew] = Load(G,P, I,K)

(b) Compute Cupper and R =PK

i=1R1, If R/Cupper > target_ratio, break

(c) for i = 1 : K

i. G(i) = G(i)/b(i)

Page 102: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

88 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

ii. P (i) = b(i) ∗ P (i)iii. fac(i) = fac(i) ∗ b(i)

3. return fac, Inew

The inputs and the outputs of this algorithm are the same as the subroutine

above. This algorithm initially loads K users with the original characteristics G to

get the scaling factors b. Then each user�s channel is scaled by 1/b(i) and its power

is scaled by b(i). After scaling, K users are loaded again by Subroutine Load. The

above steps are repeated until the preset conditions are satisÞed.

This algorithm has a worst-case complexity of O(max_ite ·KN log2N ), where

max_ite is the maximum number of iterations allowed. Simulations show thatmax_ite

is typically on the order ofK while achieving data rates close to the capacity (R/Cupper >

98%). Loosely speaking, the algorithm has a complexity of O(K2N log2N ).

4.3.3 Unequal Priority : max(αR1 + (1− α)R2)This subsection describes a new algorithm to calculate the scaling factors b1, b2 where

two users have different priorities. The objective is to maximize the weighted sum of

the two users� data rates αR1 + (1 − α)R2, subject to individual power constraints.By sweeping the priority factor α from 0 to 1, we can obtain the capacity region of

Gaussian MAC. Without loss of generality, this chapter assumes α ∈ (0.5, 1]. Thediscrete optimal PSDs are

�S1(i) =

[α− b1g−11 (i)]+, if i ∈ I1[α− b1g−11 (i)]+ − �S2(i), if i ∈ I20, if i ∈ I3

(4.40)

�S2(i) =

0, if i ∈ I1[1− α− b2g−12 (i)· 2α−1b1g

−11 (i)−b2g

−12 (i)

]+,if i ∈ I2

[1− α− b2g−12 (i)]+, if i ∈ I3

(4.41)

Page 103: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.3. MULTIUSER WATER-FILLING ALGORITHMS 89

where the frequency bands I1, I2, I3 are

I1 : b1g−11 (i) ≤ b2g−12 (i)

I2 : b2g−12 (i) < b1g

−11 (i) ≤ b2g−12 (i) + 2α− 1

I3 : b1g−11 (i) > b2g

−12 (i) + 2α− 1, (4.42)

and the scaling factors bn > 0, n = 1, 2 must satisfy the power constraints

NPi=1

�Sn(i)− bnPn = 0, n = 1, 2. (4.43)

There are three frequency bands for the optimal solution (Figure 4.4). In band I2,

two users share some of the frequency and thus the FDMA scheme is not optimal.

Furthermore, unlike the equal priority case, the scaling factor bn(n = 1, 2) cannot be

calculated easily from the power constraint equation (4.43) because of the frequency

sharing in the frequency band I2. An alternative approach is developed to obtain the

optimal solution by iterating over the scaling factors bn(n = 1, 2). First, two functions

are deÞned:

f(b1, b2) =NPi=1

�S1(i)− b1P1 (4.44)

g(b1, b2) =NPi=1

( �S1(i) + �S2(i))− (b1P1 + b2P2)

=NPi=1

[α− l(i)]+ − (b1P1 + b2P2) (4.45)

where

l(i) = min(b1g−11 (i), b2g

−12 (i) + 2α− 1).

Given a pair of scaling factors (b1, b2), the Þrst function f(b1, b2) represents the dif-

ference between the real allocated power and the power constraint for user 1. This

function tacitly depends on the scaling factor b2 through its implication on �S1, al-

though b2 does not appear in the right side of the equation. The second function

g(b1, b2) represents the difference between the allocated power for the two users and

Page 104: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

90 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

the total power constraint. The objective is to Þnd the optimal pairs of (b1, b2) such

that these two functions equal zero, i.e., to satisfy the power constraint.

Lemma 3 Suppose the scaling factors bn(n = 1, 2) satisfy (4.42). Then, the func-

tion f(b1, b2) is a strictly decreasing function of the variable b1 for a Þxed b2 and an

increasing function of the variable b2 for a Þxed b1. The function g(b1, b2) is a strictly

decreasing function of both the variables b1 and b2.

Proof. For a Þxed b2 , the bottom of the container for user 1 (b1g−11 ) goes up as

b1 increases. As a result, user 1 has a smaller number of subcarriers (i.e., I1, I2 are

smaller) because user 2 may occupy some subcarriers that were previously assigned to

user 1. Furthermore, the PSD of user 1 in frequency bands I1, I2 is smaller since the

bottom of the container goes up but the water level is Þxed at α. The scaled power

constraint b1P1 also becomes larger. Thus the function f(b1, b2) strictly decreases as b1increases. Inversely, for a Þxed b1, as b2 increases, user 1 takes over1 some subcarriers

from user 2 and thus f(b1, b2) increases.

The minimum bottom of the containers for two users is min(b1g−11 (i), b2g−12 (i) +

2α− 1). Whenever b1 or b2 increases, the bottom goes up but the water level is Þxed.The scaled power constraint b1P1 + b2P2 also increases. Therefore, g(b1, b2) strictly

decreases.

Theorem 4 If the scaling factor bn (n = 1, 2) satisÞes (4.42), then the curve f(b1, b2)

= 02 has a positive slope and the curve g(b1, b2) = 0 has a negative slope in the b1-b2plane. Furthermore, there is one unique intersection point that is the optimal solution.

Proof. Suppose f(m1,m2) = f(l1, l2) = 0 and l1 > m1. From Lemma 1, f(b1, b2)

strictly decreases with b1 for a Þxed b2. Hence,

0 = f(l1, l2) = f(m1,m2) > f(l1,m2)1For a Þxed b1, if b2 increases by only a small value, the frequency bands I1, I2, I3 could have the

same subcarriers due to the effect of the discrete channel characterics g(i). Hence, f(b1, b2) may notstrictly increase with b2.

2The curve f(b1, b2) = 0 may not exist for some points (b1, b2) because the channel characteristicsare discrete. In those points the function is discontinuous, i.e., f(b1, b2) < 0 and f(b1+δ, b2+η) > 0,δ and η are inÞnitesimal. In our analysis, those points are added to the curve to make the curvecontinous.

Page 105: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.3. MULTIUSER WATER-FILLING ALGORITHMS 91

b2

b1b1max

b2max

A

B

C

D

f ≥ 0g ≥ 0

f ≤ 0g ≤ 0

f < 0g > 0

f > 0g < 0

L1:

L2:L3:

L4:

Figure 4.7: Two curves for f = 0 and g = 0. Binary search is used in both b1 andb2 axes.

To satisfy f(l1, l2) > f(l1,m2), l2 > m2 from Lemma 1. Thus f(b1, b2) has a positive

slope. The proof for the curve g(b1, b2) = 0 is similar.

Since these two curves are monotonic, there is only one unique intersection point.

This point is the optimal solution because it satisÞes the power constraints (f = 0, g =

0).

Figure 4.7 shows the two curves f(b1, b2) = 0 (CD) and g(b1, b2) = 0 (AB). In the

Þgure, points A and B correspond to g(b1A, 0) = 0 and g(0, b2max) = 0, respectively.

Points C and D correspond to f(b1C , 0) = 0 and f(b1D, b2max) = 0. As the curves are

monotonic, binary search will Þnd the intersection point. Since b1A cannot be easily

calculated from (4.45), instead the maximum value of the scaling factor b1 can be

found by the following equation

NXi=1

£α− b1maxg−11 (i)

¤+ − b1maxP1 = 0, (4.46)

which essentially does water Þlling for user 1 by ignoring user 2. It is easy to verify

that the intersection point in Figure 4.7 is to the left of b1max. Similarly, we can Þnd

Page 106: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

92 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

b2max by using the water-Þlling algorithm for user 2, ignoring user 1, i.e.,

NXi=1

£α− (b2maxg−12 (i) + 2α− 1)

¤+ − b2maxP2 = 0. (4.47)

Then, the range of the initial search is limited to the square formed by 0 ≤ b1 ≤ b1maxand 0 ≤ b2 ≤ b2max. The following describes how to reduce the search range and Þndthe optimum scaling pairs.

From lemma 1, f ≥ 0 if (b1, b2) is to the left side of curve CD and f ≤ 0 if

(b1, b2) is to the right side of curve CD. The same is true for the function g in terms

of curve AB. So the search square (b1 ≤ b1max,b2 ≤ b2max) can be divided into fourregions as shown in Figure 4.7. They are L1 : f ≥ 0, g ≥ 0, L2 : f ≥ 0, g ≤ 0,

L3 : f ≤ 0, g ≤ 0, and L4 : f ≤ 0, g ≥ 0. With this segmentation, it is only necessaryto know in which region is the current pair (b1, b2), instead of their exact values. For

example, if (b1, b2) is in region L1 (f(b1, b2) ≥ 0, g(b1, b2) ≥ 0), the optimal pair is tothe right. Thus the left limit of the next search is equal to b1. Similarly, if (b1, b2) is

in region L2, the optimal pair is below (b1, b2) and the new up-limit is set as b2. In the

binary search, the area of the search square is reduced by half after each iteration.

The following outlines the water-Þlling algorithm for a two-user Gaussain MAC with

unequal priorities:

Load2UserPriority(g1, g2, P1, P2,α)

1. calculate b1max from (4.46) and b2max from (4.47)

2. left = 0, right =b1max, up = b2max, down = 0, b1 = b1max, b2 = b2max

3. while (|f | > δ × (b1P1) & |g| > δ × (b1P1 + b2P2))

(a) b1 = (left+right)/2

(b) b2 = (up+down)/2

(c) if ( (b1, b2) ∈ L1) left =b1(d) if ( (b1, b2) ∈ L3) right=b1

Page 107: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.3. MULTIUSER WATER-FILLING ALGORITHMS 93

(e) if ( (b1, b2) ∈ L2) up =b2(f) else ( (b1, b2) ∈ L4) down =b2

4. calculate I1, I2, I3 from (4.42) and PSDs from (4.40)(4.41).

5. return b1, b2, I1, I2, I3

Steps 1-2 set the initial conditions of the algorithm. Step 3 gives the stopping

criteria of the iterations. The variable δ is a small value that is determined by

the accuracy requirement of the applications. Practically, if δ = 10−3, the power

constraints are considered to be satisÞed and the result is optimum. Steps 3c − 3fdetermine in which region is the current pair (b1, b2) is (see Figure 4.7) and then

update the search range for (b1, b2).

This algorithm converges very fast because of the binary search in both b1 and b2axes. The complexity of this algorithm depends on the number of iterations needed

for both b1 and b2. Suppose M1 and M2 denote the numbers of the iterations for

b1 and b2 respectively, then the total number of iteration isM1+M2. The calculation

of f(b1, b2) and g(b1, b2) is O(N) if the channel characteristics g1 and g2 are sorted.

Thus, the total complexity ismax(O(M1N+M2N), O(N log2N)), where O(N log2N)

is the sorting complexity for g1 and g2. In fact, M1 and M2 are generally a small

number (less than 20). For example, if M1 +M2 = 40, the area of the Þnal search

square is less than 2−40b1maxb2max that is sufficiently accurate. Hence, this algorithm

approximately has a worst-case complexity of O(N log2N).

If α = 0.5, both users have the same priority, and this algorithm gives the same

solution as Alg. Load2User in Section 4.3.1 as expected. However, Alg. Load2User is

more efficient than Alg. Load2UserPriority because the latter involves many multi-

plications and divisions in each iteration to calculate the values of f and g.

4.3.4 Comments on Further Research

The work presented here is limited to only two users if they have different priorities.

It will be more interesting to derive an optimal water-Þlling algorithm for an arbitrary

Page 108: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

94 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

number of users with different priorities. The theoretic result is actually available in

[61].

In a DMT multiuser system, the bits in each subchannel are discretely loaded.

Therefore, extra algorithms are needed to efficiently quantize the bits in each subcar-

riers and redistribute the power across the whole frequency band. In [64], there are

more details on these types of algorithms for a single user channel.

4.4 Simulation Results

The algorithm for more than two users is suboptimal because it may result in some

users occupying subcarriers that may not be optimal for them. Therefore, we apply

it to many different channels to verify that it can achieve data rates very close to the

capacity. The channels shown here have the following characteristics:

gi(D) = a(i) + b(i)Dc(i) (4.48)

where D = e−jω and a(i), b(i), and c(i) are constant numbers for a given user i.

These numbers are generated by pseudo-random number generators. The constants

a(i) and b(i) are uniformly distributed in [−100, 100] and c(i) is uniformly distrib-uted in [−10, 10]. In the simulation, we also assume there are 10 users. The powerconstraint Pi is also generated by a pseudo-random generator ranging from 1 to 10.

The algorithm (LoadKUser) is applied to 100 different randomly-generated scenarios.

The results show that this algorithm achieves data rates (R1 +R2 + · · ·+R10) morethan 98% of the capacity in all the scenarios.

For simplicity, we illustrate the result of a 3-user example. The channel charac-

teristics of the three users are arbitrarily chosen as

g1 = 1 + 0.5D

g2 = 3− 1.6D2

g3 = 1.3 + 2D3

Page 109: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.4. SIMULATION RESULTS 95

Iterations R =P

Ri Cupper R/Cupper

1 1.5653 1.5736 0.99472 1.5705 1.5709 0.99973 1.5708 1.5708 1

Table 4.1: Three-user channels loading process.

Iteration αR1+(1−α)R2 Capacity Ratio1 0.5928 0.6737 0.87994 0.6682 0.6737 0.99188 0.6735 0.6737 0.999712 0.6737 0.6737 1

Table 4.2: Two-user channel with unequal priority.

and the power constraint for each user is set to 1. Table 4.1 shows the achieved

data rate and the upper bound of the capacity (Cupper) after each iteration. In this

particular example, the optimal value is achieved after 3 iterations.

The other two algorithms for 2-user channels are exact and always converge to

the optimum solution. We simulated many different 2-user Gaussian multi-access

channels. The results show that they always converge very rapidly to the optimal

solution due to the binary search. We illustrate Alg. Load2UserPriority with another

arbitrarily chosen example. Suppose the two users have channel characteristics given

by

g1 = 1 + 0.6D − 1.9D3

g2 = 1− 0.7D2 + 1.4D8

where D = e−jω and the power constraint Pk, k = 1, 2 for each user is 1, and the

priority factor α is 0.7. The second column of Table 4.2 shows the achieved data rate

after a certain number of iterations. It can be seen that the ratio of the achieved data

to the capacity is very close to 1 after only 4 iterations (M1 +M2 = 4). Figure 4.8

shows the capacity region of this two-user Gaussian MAC.

Page 110: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

96 CHAPTER 4. MULTIUSER WATER-FILLING ALGORITHMS

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.90

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8Capacity Region

R1

R2

Figure 4.8: The capacity region of the two-user Gaussian multiaccess channel.

4.5 Summary

This chapter presented three efficient water-Þlling algorithms for a Gaussian MAC for

three different scenarios. These algorithms are important for computing the capacity

region of the two-user Gaussian MAC and for Þnding the optimum transmit PSDs

for different users.

First, we described an optimal algorithm (Load2User) for two users with the same

priorities. In this scenario, an FDMA scheme achieves the capacity. This algorithm

sorts the ratio of the channel characteristics and uses binary search technique to Þnd

the best frequency partition for the two users. The computational complexity of this

algorithm is O(N log2N) , which is simpler than that of previous work.

Second, we extended this algorithm to K (K > 2) users (LoadKUser). Since the

exact solution for K users has prohibitive computational complexity O(NK(K−1)/2),

we proposed a heuristic algorithm with an approximate complexity ofO(K2N log2N).

Extensive simulation results show that this suboptimal algorithm achieves data rates

close to the capacity (more than 98% of the capacity in all the channels simulated).

Page 111: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

4.5. SUMMARY 97

Lastly, we described an algorithm (Load2UserPriority) for two users with dif-

ferent priorities. In this scenario, an FDMA scheme does not achieve the optimal

solution, which implies the two users must share some of the frequency bands. As a

result, this algorithm takes a different approach by iterating over the scaling factors

and has a computational complexity of O(N log2N).

Page 112: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Chapter 5

Conclusions

Crosstalk among the twisted pairs in a telephone cable is a major impairment of

DSL systems. The severe crosstalk not only limits the data rate and the reach of

the services, but also affects its reliability and availability. Current DSL deployments

rely exclusively on the crosstalk model, not on the actual crosstalk environment.

The crosstalk model often represents the worst scenario and thus limit signiÞcantly

the overall system�s performance. Besides, the crosstalk model does not provide the

knowledge of the strong crosstalkers for any given pair, which makes the system

diagnosis very difficult.

Spectral compatibility is a critical issue in the heterogeneous DSL systems. A

spectrum management standard [29] is developed in ANSI committee T1 to limit the

signal powers from different systems. This standard is also based on the crosstalk

model. In this sense, it describes static spectrum management.

Recently, many DSL vendors and operators are interested in dynamic spectrum

management (DSM). The DSM principle is that every modem dynamically adjusts its

transmit PSD, based on the individual crosstalk environment. A new DSM standard

is currently pursued in ANSI subcommittee T1E1.4.

98

Page 113: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

5.1. CROSSTALK IDENTIFICATIONS 99

5.1 Crosstalk IdentiÞcations

For both ILECs and CLECs, it is valuable to identify the crosstalk environment

for each pair because the crosstalk information can help them offer better services

to more users. However, because of the competitive nature of ILECs and CLECs,

there is little coordination between them so far and no crosstalk coupling functions

among the twisted pairs are available to the operators. This dissertation brings a new

idea of an impartial network maintenance center (NMC) that estimates the crosstalk

functions among the twisted pairs for all operators. The estimation process for the

crosstalk transfer functions includes four steps.

1. The NMC captures the signals from different modems for a pre-deÞned time du-

ration. The modems can belong to different service operators and offer different

services (HDSL, ADSL, SDSL, etc.).

2. Resample the input signals according to the clock rate of the receiver, if the

crosstalk signals and the primary signal have different sampling rate. This

step is to ensure the stationarity of the crosstalk transfer function. Without

resampling, the discrete crosstalk transfer functions are nonstationary.

3. Align the input and the output signals using a cross-correlation technique. This

alignment is necessary because the timing in each modem is not identical and

the pre-deÞned time periods have timing offsets. The cross-correlation technique

can also identify the dominant crosstalkers for a given line.

4. Estimate the crosstalk function using the least-squares method.

Theoretic analysis and simulation results both conÞrmed that the proposed tech-

nique can identify the crosstalk responses very accurate with a reasonable computa-

tional complexity. In fact, the crosstalk identiÞcation technique can also be imple-

mented within a single service operator. In this case, each operator has its own NMC.

However, only the crosstalk transfer functions among the operator�s own twisted pairs

can be identiÞed but the crosstalk transfer functions among the lines belonging to

different operators cannot be easily estimated.

Page 114: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

100 CHAPTER 5. CONCLUSIONS

5.2 Crosstalk Cancellation

ADSL service has been the most widely deployed DSL service. To improve the data

rate or the line reach, methods are needed for an ADSL receiver to cancel or mitigate

the impact of the crosstalk from other types of services, such as HDSL, SDSL, and T1.

This dissertation presents two new methods to reduce the impact of one dominant

crosstalk.

The decision-aided method decodes the crosstalk signal based on the observation

in some frequency bands. The crosstalk signal is then reconstructed and cancelled

in other bands. The method has the problem of error propagation. The MMSE

estimation and cancellation method does not decode the crosstalk signal, but uses the

MMSE estimation result directly to construct the interference and cancel it in other

frequency bands. The latter approach is particularly better to suppress one HDSL

or SDSL NEXT because the decision-aided approach can not decode the crosstalk

signal reliably due to high attenuation and the signal loss in the low-frequency band

[0− 26 kHz]. Both methods hinge on the fact that the crosstalk signal has excessivebandwidth and there is redundant information in the excess band.

This dissertation also presents an intuitive explanation of crosstalk cancella-

tion, which provides the guidance to select the right frequency bands to estimate the

crosstalk signal. One interesting result of the MMSE estimation and cancellation is

that the gain of interference suppression is the same no matter if the crosstalk signal

is estimated in the main lobe or in the excess band. In general, the main lobe has

larger interference than the excess band. Therefore, if the crosstalk signal is estimated

in the main lobe, the interference caused by the excess band can be eliminated. Con-

versely, if the crosstalk signal is estimated in the excess band, the SINR gain in the

main lobe is equal to the interference to noise ratio in the excess band. The larger

the interference in the excess band, the better the suppression of the interference in

the main lobe. If there is no excess bandwidth, there is no performance improvement

by the proposed methods.

A fast computational algorithm is developed for practical implementation with

Page 115: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

5.3. MULTIUSER WATER-FILLING ALGORITHMS 101

slightly degraded performance. This method avoids matrix inversion and large ma-

trix multiplication in every transmission block. In contrast, the traditional MMSE

estimation requires high computational complexity since the crosstalk signal is non-

stationary and large matrix inversion is need in every transmission block.

In conclusion, the MMSE estimation and cancellation scheme is very effective in

cancelling the crosstalk if the crosstalk has a large percentage of excess bandwidth.

In current DSL systems, NEXT into an ADSL receiver has a large excess bandwidth,

this method is therefore very effective for cancelling one dominant NEXT disturber.

5.3 Multiuser Water-Þlling Algorithms

This dissertation also presents three efficient water-Þlling algorithms for a Gaussian

MAC for three different scenarios. These algorithms are important for computing the

capacity region of the two-user Gaussian MAC and for Þnding the optimum transmit

PSDs for different users.

First, we described an optimal algorithm (Load2User) for two users with the

same priorities. In this scenario, an FDMA scheme achieves the capacity.

Second, we extended this algorithm to K (K > 2) users (LoadKUser). Since the

exact solution for K users has prohibitive computational complexity O(NK(K−1)/2),

we proposed a heuristic algorithm with an approximate complexity ofO(K2N log2N).

Extensive simulation results show that this suboptimal algorithm achieves data rates

close to the capacity (more than 98% of the capacity in all the channels simulated).

Lastly, we described an algorithm (Load2UserPriority) for two users with dif-

ferent priorities. In this scenario, an FDMA scheme does not achieve the optimal

solution, which implies the two users must share some of the frequency bands. As a

result, this algorithm takes a different approach by iterating over the scaling factors

and has a computational complexity of O(N log2N).

Page 116: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Appendix A

Proof of Equation (2.7)

The mean of the cross-correlation �Ryxi in (2.6) is

E( �Ryxi(l))

=1

N

NPm=1

KPj=1

vjPt=0

hj(t)E (xj(m− t+ dj)x∗i (m+ l))

=viXt=0

hi(t)Rxi(l + t− di)

= Ryxi(l).

Since the transmitted data are assumed to be zero mean and independent between

users, the variance of the cross-correlation �Ryxi contains three components:

σ2R = var( �Ryxi(l))

= σ2Ri + σ2Rj+ σ2Rn

where σ2Ri denotes the variance caused by user i, σ2Rj(j 6= i) is the variance caused

by other users, and σ2Rn is the variance from noise. The variance from user i is

σ2Ri = E

°°°° 1N NPm=1

vjPt=0

hi(t)xi(m− t+ di)x∗i (m+ l)°°°°2

−R2yxi(l).

102

Page 117: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

103

The above equation is difficult to evaluate with no further assumptions. If the trans-

mitted data of user i are almost temporally uncorrelated (Rxi(l) ≈ εiδ(l)) and haveGaussian distributions, the variance can be approximated by

σ2Ri ≈1

Nε2i ||hi||2 (A.1)

where ||hi|| is the norm of the crosstalk function hi(t). The variance caused by otherusers is

σ2Rj =

E

°°°°° NPm=1

Pj 6=i

vjPt=0

hj(t)xj(m− t+ dj)x∗i (m+ l)°°°°°2

N2

≈ εiN

KXj=1,j 6=i

εj||hj||2 (A.2)

where K is the total number of users. The approximation is due to the assumption

that the transmitted data are temporally independent for each user and have Gaussian

distributions. The variance caused by noise is

σ2Rn =εiσ

2n

N(A.3)

where σ2n is the noise variance. Therefore, the variance of the cross-correlation �Ryxiis approximately

σ2R = var( �Ryxi(l))

≈ εiN

ÃKXj=1

εj||hj||2 + σ2n!.

Page 118: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

Bibliography

[1] ITU, �A digital modem and analogue modem pair for use on the public switched

telephone network (PSTN) at data signalling rates of up to 56 000 bit/s down-

stream and up to 33 600 bit/s,� in ITU-T Recommendation V.90, Sept. 1998.

[2] T. Starr, J. M. Cioffi, and P. Silverman, Understanding Digital Subscriber Line

Technology. Prentice Hall, 1998.

[3] ITU, �Overview of digital subscriber line (DSL) recommendations,� in ITU-T

Recommendation G.995.1, Jun. 1999.

[4] ITU, �Digital transmission system on metallic local lines for ISDN basic rate

access,� in ITU-T Recommendation G.961, Mar. 1993.

[5] ITU, �High bit rate digital subscriber line tranceivers,� in ITU-T Recommenda-

tion G.991.1, Oct. 1998.

[6] G.-H. Im and J.-J. Werner, �Bandwidth-efficient digital transmission over un-

shielded twisted-pair wiring,� IEEE Journal on Selected Areas in Communica-

tions, vol. 13, pp. 1643�1655, Dec. 1995.

[7] ANSI, �High bit rate digital subscriber line - second generation,� in ANSI

T1E1.4/2000-006 HDSL2 Draft Standard, Feb. 2000.

[8] G. Ungerboeck, �Trellis-coded modulation with redundant signal sets. I. Intro-

duction,� IEEE Communications Magazine, vol. 25, pp. 5�11, Feb. 1987.

[9] ITU, �Single-pair high-speed digital subscriber line (SHDSL) transceivers,� in

ITU-T Recommendation G.991.2, Feb. 2001. To be published.

104

Page 119: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

BIBLIOGRAPHY 105

[10] I. Kalet, �The multitone channel,� IEEE Transactions on Communications,

vol. 37, pp. 119�124, Feb. 1989.

[11] A. Ruiz, J. M. Cioffi, and S. Kasturia, �Discrete multiple tone modulation with

coset coding for the spectrally shaped channel,� IEEE Transactions on Commu-

nications, vol. 40, pp. 1012�1029, Jun. 1992.

[12] M. L. Doelz, E. T. Heald, and D. L. Martin, �Binary data transmission techniques

for linear system,� Proceedings of IRE, pp. 656�661, May 1957.

[13] J. A. C. Bingham, �Multicarrier modulation for data transmission : an idea

whose time has come,� IEEE Communications Magazine, pp. 5�14, May 1990.

[14] ANSI, �Very-high-bit-rate digital subscriber line (VDSL) metallic interface. Part

I: Functional requirements and common speciÞcation,� in ANSI T1E1.4/2000-

009R1 VDSL Draft Standard, Aug. 2000.

[15] ANSI, �Very-high-bit-rate digital subscriber line (VDSL) metallic interface. Part

III: Technical speciÞcation for a multi-carrier modulation tranceiver,� in ANSI

T1E1.4/2000-013R2 VDSL Draft Standard, Aug. 2000.

[16] ANSI, �Very-high-bit-rate digital subscriber line (VDSL) metallic interface. Part

II: Technical speciÞcation for single-carrier modulation (scm) tranceivers,� in

ANSI T1E1.4/2000-011R1 VDSL Draft Standard, Aug. 2000.

[17] W. D. Reeve, Subscriber loop signaling and transmission handbook : digital. IEEE

Press, 1995.

[18] K. Jacobsen, �Methods of upstream power backoff on very high-speed digital

subscriber lines,� IEEE Communications Magazine, vol. 39, pp. 210�216, Mar.

2001.

[19] W. Yu and J. M. Cioffi, �An adaptive multiuser power control algorithm for

VDSL,� submitted to IEEE Journal on Selected Areas in Communications: Spe-

cial Issue on Twisted-pair Transmission, 2001.

Page 120: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

106 BIBLIOGRAPHY

[20] S. H. Lin, �Statistical behavior of multipair crosstalk,� Bell System Technical

Journal, pp. 955�974, Jul./Aug. 1980.

[21] J. H.W. Unger, �Near-end crosstalk model for line studies,� inANSI contribution

T1D1.3/85-244, Nov. 1985.

[22] C. Valenti, �Cable crosstalk parameters and models,� in ANSI contribution

T1E1.4/97-302, Sept. 1997.

[23] J. A. C. Bingham, ADSL, VDSL, and Multicarrier Modulation. John Wiley &

Sons, Inc., 2000.

[24] K. T. Foster and J. W. Cook, �The radio frequency interference (RFI) enviro-

ment for very high-rate transmission over metallic access wire-pairs,� in ANSI

contribution T1E1.4/95-020, Feb. 1995.

[25] J. A. C. Bingham, �RFI suppression in multicarrier systems,� inGlobecom, vol. 2,

pp. 1026�1030, Nov. 96.

[26] B. Wiese and J. A. C. Bingham, �Digital radio frequency cancellation for DMT

VDSL,� in T1E1.4/97-460, Dec. 1997.

[27] J. W. Cook, �Wideband impulsive noise survey of the access network,� British

Telecom Technical Journal, vol. 11, pp. 155�162, July 1993.

[28] P. Odling, B. Mayr, and S. Palm, �The technical impact of the unbundling

process and regulatory action,� IEEE Communications Magazine, vol. 38,

pp. 74�80, May 2000.

[29] ANSI, �Spectrummanagement for loop transmission systems,� inANSI Standard

T1.417, 2001.

[30] ITU, �Overview of TMN recommendations,� in ITU-T Recommendation M.3000,

Feb. 2000.

[31] J. M. Cioffi and et. al., �Example improvements of dynamic spectrum manage-

ment,� in ANSI contribution T1E1.4/2001-089, Feb. 2001.

Page 121: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

BIBLIOGRAPHY 107

[32] C. Zeng, C. Aldana, A. Salvekar, and J. M. Cioffi, �Crosstalk identiÞcation in

xDSL systems,� to appear in IEEE Journal on Selected Areas in Communica-

tions: Special Issue on Multiuser Detection, 2001.

[33] C. Zeng and J. M. Cioffi, �Crosstalk cancellation in xDSL systems,� submitted to

IEEE Journal on Selected Areas in Communications: Special Issue on Twisted-

pair Transmission, 2001.

[34] C. Zeng, L. M. C. Hoo, and J. M. Cioffi, �Efficient water-Þlling algorithms for a

Gaussian multiaccess channel with ISI,� in IEEE Vehicular Technology Confer-

ence, pp. 1072�1077, Fall 2000.

[35] C. Zeng, L. M. C. Hoo, and J. M. Cioffi, �Optimal water-Þlling algorithms for

a Gaussian multiaccess channel with ISI,� in IEEE International Conference on

Communications, pp. 2421�2427, Jun. 2001.

[36] C. Zeng, L. M. C. Hoo, and J. M. Cioffi, �Water-Þlling algorithms for a Gaussian

multiaccess channel with ISI,� submitted to IEEE transactions on Communica-

tions, 2001.

[37] J. W. Cook, et. al., �The noise and crosstalk environment for ADSL and VDSL

systems,� IEEE Communications Magazine, vol. 37, pp. 73�78, May 1999.

[38] J. M. Cioffi, et. al., �Rejection of home LAN NEXT in VDSL via soft cancella-

tion,� in ETSI TM6 Standard Contributions TD15, (Edinburgh), Sept. 1999.

[39] K. Cheong, Multiuser Detection for DSL Applications. Ph.D. thesis, Stanford

University, 2000.

[40] G. C. Goodwin and R. L. Payne, Dynamic System IdentiÞcation: Experiment

Design and Data Analysis. Academic Press, 1977.

[41] V. Siskind, �Second moments of inverse Wishart-matrix elements,� Biometrika,

pp. 690�691, 1973.

Page 122: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

108 BIBLIOGRAPHY

[42] P. Shaman, �The inverted complex Wishart distribution and its application to

spectral estimation,� Journal of Multivariate Analysis, vol. 10, pp. 51�59, 1980.

[43] C. H. Knapp and G. C. Carter, �The generalized correlation method for es-

timation of time delay,� IEEE Transactions on Acoustics, Speech, and Signal

Processing, vol. ASSP-24, pp. 320�327, Aug. 1976.

[44] T. Kailath, A. H. Sayed, and B. Hassibi, Linear Estimation. Prentice Hall, 1999.

[45] J. M. Cioffi and T. Kailath, �Fast, recursive-least-squares transversal Þlters for

adaptive Þltering,� IEEE Transactions on Acoustics, Speech, and Signal Process-

ing, vol. ASSP-32, pp. 304�336, 1984.

[46] J. M. Cioffi, �The block-processing FTF adaptive algorithm,� IEEE Transactions

on Acoustics, Speech, and Signal Processing, vol. ASSP-36, pp. 77�90, 1986.

[47] T. W. Anderson, An introduction to Multivariate Statistical Analysis. JohnWiley

& Sons, 1958.

[48] ITU, �Test procedures for digital subscribe line (DSL) transceivers,� in ITU-T

Recommendation G.996.1, Jun. 1999.

[49] F. Tarkoy, �Iterative multi-user decoding for asynchronous users,� in Interna-

tional Symposium on Information Theory, p. 30, 1997.

[50] M. Moher, �An iterative multiuser decoder for asynchronous BPSK users,� in

International Symposium on Information Theory, p. 423, 1998.

[51] B. R. Petersen and D. D. Falconer, �Minimummean square equalization in cyclo-

stationary and stationary interference-analysis and subscriber line calculations,�

IEEE Journal on Selected Areas in Communications, vol. 9, pp. 931�940, Aug.

1991.

[52] M. Abdulrahman and D. D. Falconer, �Cyclostationary crosstalk suppression

by decision feedback equalization on digital subscriber loop,� IEEE Journal on

Selected Areas in Communications, vol. 10, pp. 640�649, Apr. 1992.

Page 123: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

BIBLIOGRAPHY 109

[53] ITU, �Asymmetric digital subscriber line (DSL) transceivers,� in ITU-T Recom-

mendation G.992.1, Jun. 1999.

[54] G. H. Golub and C. F. V. Loan, Matrix Computation. The John Hopkins Uni-

versity Press, 1996.

[55] G. D. Forney Jr. and M. V. Eyuboglu, �Combined equalization and coding using

precoding,� IEEE Communications Magazine, pp. 25�34, Dec. 1991.

[56] T. M. Cover and J. A. Thomas, Elements of Information Theory. John Wiley &

Sons Inc., 1991.

[57] S. Verdu, �Multiple-access channels with memory with and without frame syn-

chronism,� IEEE Transactions on Information Theory, vol. 35, pp. 605�619, May

1989.

[58] S. Verdu, �The capacity region of the symbol-asynchronous Gaussian multiple-

access channel,� IEEE Transactions on Information Theory, vol. 35, pp. 733�751,

July 1999.

[59] R. S. Cheng and S. Verdu, �Gaussian multiaccess channels with ISI: Capacity

region and multiuser water-Þlling,� IEEE Transactions on Information Theory,

vol. 39, pp. 773�785, May 1993.

[60] R. G. Gallager, Information Theory and Reliable Communication. John Wiley

& Sons Inc., 1968.

[61] D. N. C. Tse and S. V. Hanly, �Multiaccess fading channels - Part I: Polyma-

troid structure, optimal resource allocation and throughput capacities,� IEEE

Transactions on Information Theory, vol. 44, pp. 2796�2815, 1998.

[62] S. N. Diggavi, �Multiuser DMT: a multiple access modulation scheme,� in Globe-

com, vol. 3, pp. 1566�1570, Nov. 1996.

[63] W. Yu and J. M. Cioffi, �FDMA-capacity of the Gaussian multiple access channel

with ISI,� in IEEE International Conference on Communications, vol. 3, pp. 1365

�1369, Jun. 2000.

Page 124: CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL … · CROSSTALK IDENTIFICATION AND CANCELLATION IN DSL SYSTEMS ... has a large excess bandwidth and its spectra in the main lobe

110 BIBLIOGRAPHY

[64] J. M. Cioffi, �Class notes on advanced digital communication.�

http://www.stanford.edu/class/ee379c, 2000.