Upload
frode-randers
View
219
Download
0
Embed Size (px)
Citation preview
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
1/41
1(5)
Forward-Error-Control-Assisted Detection
Petra Deutgen and Frode Rand ers
Lule University of TechnologyDiv. of Signal Processing
S-951 87 LuleSweden
Ericsson Radio Systems ABS-164 80 StockholmSweden
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
2/41
2(5)
Abstract
In the North American Digital Cellular Mobile Telephone System, D-AMPS, described by the stan dard TIA/ EIA IS-54, only a part of the d igi-
tal speech information is protected against transmission errors by anerror correcting code. This thesis considers a scheme th at u ses coded bitsto decrease the bit error rate of both uncoded bits and time-delayedcoded bits during detection. The detection scheme has been imple-men ted in a simulation environment for D-AMPS.
A p erformance gain of up to 3 dB of C/ I has been experienced for theunprotected speech data on a frequency selective fading channel for aresidual bit error rate of 1%. Correcting time-delayed coded bits is not assuccessful as correcting uncoded bits; coded bits showed only a verysmall decrease in bit error rate.
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
3/41
3(5)
Acknowledgements
The first part of the Masters thesis, written as a conference contribu-tion, could not have been written without the generous help of Karim
Jamal of Ericsson Radio Systems, d epar tment of Radio Access and Sig-nal Processing Research and Hkan Eriksson and Per dling both ofLule University of Technology, division of Signal Processing. Theopp ortunity to w rite such kind a pap er gave us great inspiration an d joy.We are most gra teful to them for their help.
We also wan t to th ank ou r ad viser, Johan von Pern er of Ericsson RadioSystems, department of Radio Base Station Development, he gave usvaluable sup por t, when w e were developing the reference simu lator. Asthe new detection scheme was developed, we experienced a largeamoun t of inspirat ion and h elp from our ad viser Karim Jamal. Thereforewe want to thank him once more, for his excellent gu idan ce.
It has been a stimu lating and pleasant tim e at Ericsson Radio Systems.We especially want to thank Omar Ryde and Erol Incenacar, both of Eric-sson Radio Systems, d epar tment of Radio Base Station Developm ent,wh o have contributed to this.
Petra Deutgen and Frode Randers
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
4/41
4(5)
Introduction
This Master s thesis p roject w as performed at Ericsson Radio Systemsin Kista, Sweden , as a p artial fulfillmen t of the degree of Master of sci-
ence in comp uter science and electrical engineering a t Lule Universityof Technology. This project is a result of a cooperation between twodep artm ents of Ericsson Radio Systems: the departmen t of Rad io Accessand Signal Processing Research (section of Rad io Access Research ERA/T/ UR) and the d epartmen t of Radio Base Station Development (sectionof Digital Modem Design AR/ RB).
The aim of this thesis has been to eva luate the substan ce of a re-detec-tion scheme herein denoted the multi-pass re-detection scheme, pro-posed by Paul Dent, of Ericsson-GE Mobile Communications Inc., RTP,NC. In order to measure the performance gain of the above-mentionedmethod , we h ave implemented a m ulti-pass re-detection scheme in theSysSim1 simu lation environment. We have been able to simu late the per-formance of both th e original receiver (a prod uct simu lator of TRX884, apart of a base station for the D-AMPS system) and the multi-passreceiver, run under actual conditions. Through these simulations, wehave been able to study various facets of the performance of the multi-pass receiver.
This thesis comprises four parts, of which part I is intended to be aself-contained conference contribution. The other parts, parts II-IV,describe the multi-pass re-detection scheme and the implementation ofit in greater d etail. Anoth er possible application of the method th an d oc-um ented in p art I is described in par t III.
Part I is written in the form of a conference paper that presents theresults of our w ork with re-detection ofuncodedbits by means of a mu lti-pass re-detection scheme.
Part II considers the possibility of using the multi-pass re-detectionscheme with d ifferent schemes of signalling. We concentrate on coherentQuad riphase Shift Keying (QPSK) mod ulation and Differential Quad -riph ase Shift Keying (DQPSK) that is used in D-AMPS.
Part III investigates the possibility of using error corrected bits todecrease the bit error rate for the time-delayed codedbits.
Part IV is a documentation of the parts of the software simu lator of themulti-pass re-detection receiver. Part IV will be more informative forreaders already familiar with the SysSim simulation environment. Anexplanation of the implementation of the multi-pass re-detectionreceiver is given with linkage to source code. The source code itself is,
1. SysSim is a simulation en vironm ent d eveloped at Ericsson Radio Systemsthat allows system simulation.
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
5/41
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
6/41
Part 1
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
7/41
1(6)
AbstractIn the North American Digital CellularMobile Telephone System, D-AMPS, described by thestandard EIA/TIA IS-54, only a part of the digital speechinformation is protected against transmission errors by anerror correcting code. We evaluate a method, suggested in[1], that uses coded bits interleaved among uncoded bits to
decrease the bit error rate among the uncoded bits. In thismethod information about error-corrected data bits is fedback to aid a subsequent re-detection of the uncoded databits.
Simulations indicate that a decrease in the bit error rate
for unprotected speech data bits is achievable. A perfor-
mance gain of up to 3 dB of C/I has been experienced on a
frequency selective fading channel for a residual bit error
rate of 1%.
I. INTRODUCTION
In this paper, the detection of blocks of binary data in digi-
tal cellular telephone systems is investigated. Many contem-porary communication systems use unequal Forward Error
control Coding (FEC) [2], that is, some bits are protected by
more error correcting codes than other bits. This gives the
receivers access to more information about some bits than
about others. We investigate the potential of a scheme that
takes advantage of this.
We will focus on applying a re-detection method to the
North American D-AMPS system, specified by the standard
EIA/TIA IS-54 [3]. In the D-AMPS transmission format, the
bursts consist of both coded and uncoded bits, and the coded
bits are interspersed among the uncoded. This implies that
after having decoded the surrounding coded bits, an enhancedre-detection of the uncodedbits could be possible.
Assuming that the protected bits have been decoded cor-
rectly, these bits are used as known bits when re-detecting the
burst. Due to the memory in the modulation (differential
modulation), the re-detection can improve the Bit Error Rate
(BER) for the uncoded bits. Memory induced by the channel
(ISI) also allows for improvement, as does the use of decision
directed channel tracking.
Within a burst, the bits from the current frame are mixed
with bits from the next frame, due to interleaving. Therefore
it could also be possible to improve the BER for both the
uncoded andcoded bits belonging to this next frame [8].
The speech distortion known as warbling, sometimes
encountered in the VSELP speech decoder of D-AMPS, is
mainly due to bit errors among the uncoded bits. A method of
improving the BER for uncoded bits, with either a differential
detector or with a maximum likelihood sequence estimator
(MLSE), has recently been put forward in [1]. With a suitably
chosen interleaving pattern, a significant BER reduction is
claimed for the uncoded bits.Thus it is expected that such a
re-detection scheme would enhance the speech quality notice-
ably. In this paper we evaluate the scheme suggested in [1] for
the transmission format of D-AMPS.
Related work can be found in e.g. [4], [5] and [6] where
decoded data have been fed back to aid the detection process.
However, none of these papers exploits unequal error control
coding.
This paper proceeds as follows: Section II gives a shortdescription of the channel coder and the interleaver employed
in the reference transmission system. Section III presents the
one-pass receiver. Section IV outlines the re-detection of
uncoded bits with the aid of coded bits. Section V studies an
implementation of the re-detection scheme, denoted multi-
pass receiver, with the one-pass receiver, as a building block.
Depending on the interleaving, three types of multi-pass
receivers are studied, called the two-pass, three-pass and
composite receiver, respectively. The simulation setup is
described together with the simulated performances of the
multi-pass receivers in Sections VI and VII. An assessment of
the increase in complexity of implementing the multi-passreceivers is given in Section VIII, and finally, conclusions are
presented in Section IX.
II. CHANNEL CODING AND INTERLEAVING
The IS-54 standard discriminates among three levels of
FEC-induced protection, see Figure 1. For the bits with the
lowest significance, referred to as class 2 bits, no protection is
invoked. For the bits at the next level of significance, class 1
bits, a convolutional code has been used. Among the class 1
bits, the partition corresponding to the perceptually most sig-
Forward-Error-Control-Assisted Detection of Uncoded Bits in IS-54
Petra Deutgen and Frode Randers
Ericsson Radio Systems AB
S-164 80 StockholmSweden
Lule University of Technology
Div. of Signal ProcessingS-971 87 LuleSweden
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
8/41
2(6)
nificant bits, here denoted class 1a bits, have been addition-
ally protected by means of a cyclic redundancy check code
(CRC). All other class 1 bits are referred to as class 1b bits.
In the block-diagonal interleaving scheme of D-AMPS,
both coded and uncoded bits of a frame are written column-
wise into a bit matrix, able to contain one frame. The bits arethen transmitted row-wise in a burst B[k].
Figure 2 showsB[k] being assembled. The bits are selected
row-wise, alternatingly, from the matrix containing the cur-
rent frame, C[k], and the matrix containing the previous
frame, C[k-1]. Thus, the interleaving depth is one frame. In
terms ofC[k] andB[k], the interleaving can be described as
where and correspond to the set of even and odd
rows of the interleaving matrix, respectively.
III. THE ONE-PASS RECEIVER
Figure 3 shows the one-pass receiver scheme used in this
work. The detector is an adaptive MLSE with decision feed-
back channel tracking and with a subsequent differential
Figure 1. The channel coding and interleaving [2]
Figure 2. The interleaving
12 most
perceptuallysignificant bits
12
coded
class 1
bits 260260
7178
82
77
2-slotinterleaver
voice
cipher(optional)
Convolutional
encoder
(2,1,5)
Linear
block code
(19,12)
class 2 bits
class 1 bits
speech
coder
5
tail bits
10 bits
...
.
.. .
.
...
.
. . .
C[k-1] C[k]
c [k-1] c [k]1 2
c [k-1] c [k]1 2
c [k-1]1
0
2
1
3
B[k]
C k[ ] c1 k[ ] c2 k[ ]{ , }=
B k[ ] c1 k 1[ ] c2 k[ ]{ , }=
c1 k[ ] c2 k[ ]
decoder. The sequence estimation is done with a soft output
Viterbi detector. After the detection of the current burst, B[k],
de-interleaving is done, creating the frame C[k-1]. The class 1
bits are then decoded, while the class 2 bits are taken directly
from the de-interleaved frame, C[k-1].
IV. DETECTION OF UNKNOWN BITS AMONG KNOWN IN IS-54
To take advantage of the unequal protection of the trans-
mitted bits, the protected bits are, when successfully decoded,
used for restraining the trellis of the Viterbi detector (thenumber of valid transitions between the states in a trellis is
reduced) in a subsequent re-detection of the unprotected bits.
The restraining of the trellis, based upon knowledge of
coded bits, is determined by the method of modulation. With
differential phase shift keying, as used in D-AMPS, the infor-
mation lies in the differential phase shifts, so the restraining
will be in terms oftransition restraining.
Specifically, a set of data bits is associated with a specific
phase shift, see Figure 4, or equivalently a transition in the
trellis of the Viterbi algorithm. Any two parallel paths
through the trellis are equivalent as they give rise to the same
sequence of phase shifts. If the detector has knowledge of
some or all of the corresponding bits prior to detecting a dif-
ferential symbol, the trellis may be restrained, thus reducing
the number of valid transitions.
Figure 3. The one-pass receiver structure
Figure 4. A differential symbol representing two bits
F[k-1]
detector decoder
class 1 bits
class 2 bits
B[k] C[k-1]deinterleaver
c [k-1]2
c [k]2
Z-1
~
^
^B[k]^
^ ^
Q
I
(-1,-1)
(-1,1)
(1,1)(1,-1)
/2
3/2
0
~
~~
~
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
9/41
3(6)
Figure 5 shows different examples of transitions when a
symbol represents two bits; Both bits are unknown, the first
bit is known, both bits are known, the last bit is known.
V. THE MULTI-PASS RECEIVER
This section presents a receiver structure, denoted the
multi-pass receiver, that uses FEC-assisted re-detection.
Three types of multi-pass receivers will be studied, called
the two-pass, three-pass and composite receiver, respectively.
Due to the interleaving, the two-pass receiver uses some, but
not all, of the coded bits as known in the re-detection. In the
three-pass receiver all coded bits are considered as known
when re-detecting the uncoded bits, at the cost of adding a
time delay of one burst in the decoding process. The compos-
Figure 5. The restraining of the trellis
Figure 6. The multi-pass scheme
(x,1)(-1,y)(x,y) (1,1)
Q
I
Q
I
Q
I
Q
I
Prepare
feedback
information
Z-1
One-pass
receiver
B[k]~
B[k-1]~
Two-pass
receiver
Three-pass
receiver
F[k-1]^
F[k-1]^
F[k-1]^
F[k-2]^
c [k-1]^1
c [k-1]^2
Combiner
ite receiver, which is a combination of the two- and three-pass
receivers, avoids the time delay, but is able to use more pro-
tected bits than the two-pass receiver, see Figure 6.
A. The two-pass receiver
To extract information about the protected bits, a primary
detection, de-interleaving and decoding are done by the one-pass receiver, resulting in a complete set of class 1 bits as
contained in the frame . Given that the CRC check
for the class 1a bits in is affirmative, all of the coded
class 1 bits of , resulting from re-encoding
, are considered known1. Applying the two-pass re-
detection scheme, we initiate a re-detection of the class 2 bits
in the received burst by means of the two-pass receiver,
similar to the one-pass receiver. Due to interleaving, only the
fraction of the coded class 1 bits of found in
are known. Consequently, the re-detection of is
only based on these bits. The re-detection is done by restrain-
ing the trellis at the location of these known bits in the ViterbiAlgorithm (VA) of the two-pass detector. The two-pass re-
detection of burst is initiated only when the CRC check
of the class 1a bits corresponding to , in the one-
pass receiver, is affirmative.
B. The three-pass receiver
To be able to use all class 1 bits when re-detecting the class
2 bits, the three-pass receiver imposes an extra delay of one
burst. The class 1 bits in and found in
are used to re-detect the class 2 bits in .
That is, after having received and processed burst ,
is output. The restraining method is analogous tothat used in the two-pass detector. In the three-pass case,
when re-detecting burst , there are demands on an
affirmative CRC check for the class 1a bits corresponding to
as well as for the class 1a bits corresponding to
.
C. The composite receiver
The composite receiver selects the bits of from
different detectors. The class 1 bits are selected from the one-
pass receiver. The class 2 bits are taken from the two-pass and
the three-pass detectors. The class 2 bits from the two-pass
detector are found in the set and the class 2 bits
from the three-pass detector are found in the set ,
resulting in no inherent extra delay for the composite receiver.
This receiver was originally suggested in [1].
VI. SIMULATION SETUP
Figure 7 shows the simulated transmission system with
transmitter, interferer, channel and receiver. The receiver uses
1. A study using only coded class 1a bits in the restraining is
found in a related paper [8].
F k 1[ ]
F k 1[ ]
C k 1[ ]
F k 1[ ]
B k[ ]
C k 1[ ]
B k[ ] B k[ ]
B k[ ]
F k 1[ ]
C k 1[ ] C k 2[ ]
B k 1[ ] B k 1[ ]
B k[ ]
F k2[ ]
B k 1[ ]
F k 1[ ]
F k 2[ ]
F k 1[ ]
c1
k 1[ ]
c2 k 1[ ]
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
10/41
4(6)
antenna diversity as is indicated in the figure.
A. The Transmitter
Each transmitter block consists of a random data generator
and, as described by the standard IS-54, a channel encoder, an
interleaver, a burst generator and a modulator. Co-channel
interference is modelled by a single interference transmitterwhich is symbol-synchronized with the desired signal. The
influence of the co-channel interference upon the received
signal is signified by the carrier to interference ratio, C/I.
B. The Channel
Figure 8 shows the simulated channel model, with Ray-
leigh fading and co-channel interference.
The base band equivalent radio channel is modelled by a
two-path FIR model. The paths being uncorrelated and com-
plex Gaussian, with the second-order statistics described by
the isotropic scattering model [7]. This model is characterized
by the parameters (,,fd), where is the delay interval, i.e.
the distance between the paths in fractions of the symbol
time, TS, see Figure 8. The relative attenuation of the second
path is , and fd is the Doppler spread of the Rayleigh fading
Figure 7. The simulation transmission system
Figure 8. The simulated channel
Transmitter Channel Receiver
TX
(Carrier)
TX
(Interferer)
RCH
RCH
C+I RX
Transmitter
Interferer
Rayleighfader, f
Rayleighfader, f
Rayleigh
fader, f
Rayleighfader, f
Rayleighfader, f
Rayleighfader, f
Rayleighfader, f
Rayleighfader, f
(1 )2
"C/I"
A
B"C/I"
(1 )2
d
d
d
d
d
d
d
d
in Hz. Receiver antenna diversity is simulated by using two
paths with channel correlation =0.7. White Gaussian noise is
added to each path, prior to receiver filtering, with a constant
signal to noise ration (Eb/N0) of 35 dB.
C. The Receiver
Between the transmitter and receiver in Figure 7, the sam-pling rate is TS/8. The receiver filters in the simulations are
base band models of actual filters. The other parts of the
receiver are described in section V.
VII. SIMULATION RESULTS
The simulations were done to compare the performance of
the multi-pass receivers with the one-pass receiver. The per-
formance of the one-, two- and three-pass receivers, together
with the composite receiver was examined considering the bit
error rate among 15.000 frames containing 159 data bits each.
For C/I values above 14 dB, 20.000 frames were used.
Only the Residual Bit Error Rate (RBER) of the class 2 bits
is considered, i.e. the rate of bit errors in frames having an
affirmative CRC check. To achieve comparable statistics, we
required the same amount of successfully received frames for
each of the four receiver structures. Thus the RBER in the
three-pass detector will actually be taken from the burst
detected by the one-pass detector if the CRC check of frame
C[k-1] is negative and the CRC check of frame C[k-2] is affir-
mative.
Time dispersion of up to one symbol time has been simu-
lated. The attenuation of the second path, , is 0 dB unless
otherwise stated. The simulations have been done on both aslow fading channel (fd = 7 Hz) and a fast fading channel (fd= 77 Hz), corresponding to vehicle speeds of 10 and 110 km/
h, respectively, at a carrier frequency of 800 MHz.
A. Analysis of class 2 bit performance
Figure 9 shows the performance gain in C/I at 1% RBER of
the different receivers, compared to the one-pass receiver,
simulated on a fast fading channel for different time disper-
sions, up to one symbol time (here, time dispersion divided
with the sample rate, 8 samples/symbol). According to the
simulation results shown in Figure 9, the class 2 bit perfor-
mances of the multi-pass receivers are more or less indepen-dent of the degree of time dispersion.
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
11/41
5(6)
Performance simulations with fading channels without
time dispersion and varying C/I are shown in Figures 10 and
11.
The Frame Erasure Rate (FER) is measured as the number
of erased frames per total number of simulated frames. In the
simulations, the performance gain of the re-detection scheme
tends to increase with the Doppler spread. The figures shows
that the three-pass receiver has a higher performance gain
than the two-pass receiver. At 1% RBER, the composite
receiver has a performance gain of about 2 dB compared to
the one-pass receiver but about 1 dB performance loss com-
pared to the three-pass receiver. At very low C/I values, the
Figure 9. Performance Gain in C/I at 1% RBER, for time dis-
persion in the range [0,TS], fd=77 Hz
Figure 10. Class 2 RBER; fd=7 Hz, =0
0 1 2 3 4 5 6 7 80.5
0
0.5
1
1.5
2
2.5
3
3.5
Time dispersion (tau)
Performancegain(dB
)
Threepass
Composite
Twopass
Onepass
4 6 8 10 12 14 16 18 2010
5
104
103
102
101
100
C/I (dB)
RBER
x FER
Onepass
Twopass
Composite
Threepass
composite receiver is as good as the three-pass receiver.
VIII. ASSESSMENT OF THE COMPLEXITY
The computational complexities of the multi-pass receivers
are higher than the complexity of the one-pass receiver (due
to the re-detection). About 75% of the computations in the
detector, such as the decision directed channel tracking, have
to be performed separately for each detector. This adds sub-
stantially to the increase in complexity. However, because of
the restraining, not all transition metrics of the Viterbi algo-
rithm need to be computed. This will limit the increase incomplexity. The fact that the synchronization has to be done
only once for all detectors will also limit the complexity.
The increase in computational complexity for the two- and
three-pass detectors is about 80%. The composite detector
(including all three detectors) has an increase in complexity
of about 160% compared to the one-pass detector.
Furthermore, algorithm-specific computations, e.g. the cal-
culation of feedback data, will contribute to an additional
increase in complexity that is difficult to estimate, but we
assess this as small.
Memory usage is also a consideration. An additionallyreceived burst has to be stored; interleaver memory must be
added to contain restraining information between bursts;
memory for detector-specific restraining information must be
provided, etc.
The main reason for the high complexity of the multi-pass
receiver is that decision-directed channel-tracking is used in
each detectors. If this can be avoided, e.g. by channel interpo-
lation, complexity will decrease substantially. In systems
where the channel can be considered stationary, e.g. the
Figure 11. Class 2 RBER; fd=77 Hz, =0
4 6 8 10 12 14 16 18 2010
5
104
103
102
101
100
C/I (dB)
RBER
x FER
Onepass
Twopass
Composite
Threepass
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
12/41
6(6)
GSM, or systems where differential detection may be used,
e.g. the PDC, the complexity is expected to be less of a prob-
lem.
IX. CONCLUSIONS
A scheme for FEC-assisted detection of the uncoded bits of
the D-AMPS format has been investigated. The performanceat 1% RBER of the uncoded bits is improved by approxi-
mately 2 dB C/I on a fading, time-dispersive channel. The
performance gain is more or less independent of the amount
of time dispersion1. Other simulations indicates that the effec-
tiveness of the FEC-assisted detection of the uncoded bits is
dependent on the interleaving employed. The improvement is
assessed to have a noticeable impact on the speech quality of
the system, since the speech distortion problem known as
warbling is largely an effect of bit errors among unpro-
tected bits.
The complexities of the studied multi-pass detectors are
relatively high. Compared to a conventional detector, theincrease in computational load is about 160%. This is mainly
due to the use of equalizers with decision directed channel
tracking. For systems where this is not required, e.g. the GSM
(Global System for Mobile Communication) or the PDC (Per-
sonal Digital Cellular) systems, the total complexity is
expected to be significantly smaller.
ACKNOWLEDGEMENT
We wish to express our gratitude towards Mr. Karim Jamal
of Ericsson Radio Systems AB for his significant contribu-
tions to the present work.
REFERENCES
[1] P. Dent, Invention Disclosure for Decodulation, Internal Document
Ericsson-General Electric, RTP/EGE/CT/Y 93:0009, May 1993.
[2] S. Lin and D.J. Costello Jr., Error Control Coding: Fundamentals and
Applications, Englewood Cliffs, NJ: Prentice Hall, 1983.
[3] EIA/TIA Interim Standard IS-54-B, Cellular System Dual-Mode
Mobile Station - Base Station Compatibility Standard, Electronic
Industries Association, 1992.
[4] R. Mehlan, H. Meyr, Combined Equalization/Decoding of Trellis-
Coded Modulation on Frequency Selective Fading Channels, Proc.
5:th Tirrenia Int. Workshop on Digital Communications, pp. 341-352,
Elsevier Science Publishers B.V., 1992.[5] S. Chennakeshu, R.D. Koilpillai, E. Dahlman, Enhancing the Spectral
Efficiency of the American Digital Cellular System with Coded
Modulation, Proc. 44:th IEEE Vehicular Technology Conference, June
8-10, 1994, Stockholm, Sweden, pp. 1001-1005.
[6] R. Sharma, W. D. Grover and W. A. Krzymien, Forward Error Control
(FEC) Assisted Adaptive Equalization for Digital Cellular Mobile
1. Simulation not reported here shows that the effectiveness of the
FEC-assisted detection of the uncoded bits depends on the inter-
leaving employed.
Radio, IEEE Transactions on Vehicular Technology, Vol. 42, No. 1,
February 1993, pp. 94-102.
[7] R.H Clarke, A Statistical theory of Mobile Radio Reception, Bell
System Technical Journal, 1968, pp. 957-1000.
[8] P. Deutgen & F. Randers, Forward-Error-Control-Assisted Detection,
Masters Thesis 1994:149E, Lule University of Technology, Div. of
Signal Processing, 1994.
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
13/41
Part 2
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
14/41
1(3)
I. INTRODUCTION
The knowledge gained by a prior detection and decoding of
protected bits can be used in different ways depending on the
modulation employed. This paper is a continuation of part 1
and will briefly discuss different methods of doing FEC-
assisted re-detection based upon different types of modula-tion, detection and symbol constellations.
Re-detection issues for the two modulation forms Quad-
riphase shift keying (QPSK) and Differential QPSK
(DQPSK) is discussed in the following section. QPSK modu-
lation produces 4 possible symbols to be transmitted. These
symbols represent 2 bits. One or a both of these bits could be
considered as known during re-detection. Thus we distinguish
between two cases of symbol constellations containing
known bits:
Afully known symbol, where both bits of the symbol
are known.
Apartially known symbol, where one bit of the sym-bol is known.
Besides the two different modulation forms and the two
symbol constellations this paper also considers two channel
cases, withIntersymbol Interference (ISI) and without ISI. In
the former case a maximum likelihood sequence estimator
(MLSE) is used, and in the latter case a memoryless threshold
detector is used. The results are presented in a table, consist-
ing of the following sections:
QPSK modulation and channel with no ISI
QPSK modulation and channel with ISI
DQPSK modulation and channel with no ISI
DQPSK modulation and channel with ISI
II. POSSIBILITES FOR PERFORMANCE GAINS
No estimations of possible gains are made in the following
sections. Only the question if there will be a gain or not in the
detection, using a specific method, is considered.
QPSK MODULATION AND CHANNEL WITH NO ISI
This system exhibits no kind of dependencies between the
symbols. The channel has no memory, therefore a memory-
less detector is used in this section. In Subsection A re-detec-
tion of the QPSK modulated fully known symbols is
discussed and in SubsectionB re-detection of partially known
symbols is discussed.
A. Fully known symbols
All known bits are grouped into fully known symbols, and
consequently all unknown bits make up the surrounding
unknown symbols. Since there is no coupling between known
and unknown bits, the only gain possible is an enhanced
channel (phase) estimation for the surrounding unknown
symbols.
B. Partially known symbols
Due to the Gray coding normally used, there will be no
decrease in bit error probability, for the unknown bits, see
Figure 1.
The QPSK modulated symbol is equivalent to two inde-
pendent BPSK symbols each representing one bit and the
decision boundary does not change for one of the bits when
knowing the other. The only gain possible is an enhanced
channel (phase) estimation for the surrounding unknown
symbols, as in Subsection A.
Figure 1. The restraining of signal points
a) Symbol unknown b) Symol partially known;first bit known to be 1
M = 4Q
I
Q
I
(-1,-1)(-1,1)
(1,1) (1,-1) (1,1) (1,-1)
Detection of Unknown Bits Among Known Bits.
Petra Deutgen and Frode Randers
Ericsson Radio Systems ABS-164 80 Stockholm
Sweden
Lule University of TechnologyDiv. of Signal Processing
S-971 87 LuleSweden
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
15/41
2(3)
QPSK MODULATION AND CHANNEL WITH ISI
This system exhibits dependencies between the symbols.
The channel has memory and therefore an equalizer is used in
this section. In SubsectionA, re-detection of the QPSK modu-
lated fully known symbols is discussed and in Subsection B
re-detection of partially known symbols is discussed.
A. Fully known symbols
The detection of the unknown symbols will benefit from
the surrounding known symbols due to the ISI. The trellis of a
Viterbi algorithm is forced to go through a single state at each
known symbol, see Figure 2. Thus a gain is possible due to
better ISI-estimation and better channel-tracking because of
more reliable decisions.
B. Partially known symbols.
The trellis is forced to go through 2 states at the locations of
partially known symbols, see Figure 3.
There is a re-detection gain of the unknown bits in the par-
tially known symbol because of better ISI-estimation and bet-
ter channel-tracking, but there is no re-detection gain attained
by the decreased number of possible symbol-choices.
DQPSK MODULATION AND CHANNEL WITH NO ISI
This system exhibits dependences between the symbols,
Figure 2. A fully known coherent symbol
Figure 3. A partially known coherent symbol
Fully known
symbol
Unknown
symbolM = 4 Unknown
symbol
Partially known
symbol
Unknown
symbolM = 4 Unknown
symbol
due to the differential modulation. The channel has no mem-
ory and therefore a detector without equalizer is used in this
section. In this section the re-detection method of the QPSK-
modulated fully known symbols is described.
A. Fully known symbols
The re-detection method applied to this form of detectionwill consist of knowing (any number of) phase changes up to
some point and thereafter use an enhanced initial vector for
detecting the following unknown symbol. Based upon a
known phase shift 1, i.e. the angle between vector z[k-1] and
vectorz[k], a better estimate of the starting vector for the sub-
sequent unknown phase-shift 2 is feasible [1]. Figure 4
shows three incoming coherent symbols z[k-1], z[k] andz[k+1]. After detection, the output will be two differential
symbols representing the phase-shifts between z[k-1] and
z[k], and z[k] and z[k+1], respectively. In this case the first
symbol, representing the phase-shift 1, is known. The sec-
ond symbol represents the phase-shift 2. Due to the known
phase-shift, z[k] could be enhanced, which is explained in
Figure 5. With an enhanced start-symbol z[k], a better esti-
mate of the symbol representing the phase-shift 2 could be
gained.
Figure 5 shows the enhancement of the start-vector when
the phase shift is known to be . In Figure 5, z[k-1] and z[k]
are the incoming coherentsymbols when x[k-1] and x[k] aretransmitted. The phase-shift between z[k-1] and z[k] is known
as . Since the phase-shift is known to be , z[k-1] shifted
could be used instead of z[k], but this shifted symbol would
have equal statistics as z[k-1]. An enhanced symbol is
obtained by taking the average of the two symbols, the shifted
z[k-1] and z[k], as shown in Figure 5. Also, known symbols
following an unknown symbol may be used (in reverse) to
enhance the final vector of the unknown phase change (z[k+1]
in Figure 4). If infinitely many preceding phase-shifts to an
unknown phase-shift are known the coherent start-symbol of
Figure 4. Differential detection
/2
z[k-1]
z[k]
I
Q
M = 4 1 =
z[k+1]
1
(Known phase shift)
~ 2
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
16/41
3(3)
this unknown phase-shift would be correct. In this case the
differential detection would have the same performance as acoherent detector. The maximum increase is thus less than 3
dB. If an unknown symbol is surrounded by infinitely many
known symbols, the performance increase has no limit.
DQPSK MODULATION AND CHANNEL WITH ISI
This system exhibits dependences between the symbols,
due to the differential modulation and memory in the channel,
therefore an equalizer is used in this section. In SubsectionA
the re-detection method of the DQPSK modulated fully
known symbols is described and in Subsection B re-detection
of partially known symbols is described.
A. Fully known symbols
Instead of restraining the trellis to a single state, a single
transition is allowed out of each state, see Figure 6 showing
Figure 5. Symbol enhancement
Figure 6. A fully known differential symbol
Fully known
phase shift
z[k-1]
z[k]
z[k]=x[k]+n2
I
Q1
n
Shifted z[k-1]
n21n +( ) / 2
n2
Enhanced
vector
M = 4
Fully known
symbol
Unknown
symbolM = 4 Unknown
symbol
Q
I
Q
I
Q
I
three symbols, first symbol and last symbol are unknown
while the second symbol is fully known. One effect of this
kind of restraining is that the trellis is forced apart at the loca-
tion of a fully known symbol. As in the case of coherent mod-
ulation there is a performance gain possible due to better ISI
estimation and better channel-tracking. A performance gain
because of noise averaging is also made possible, due to thedifferential modulation.
B. Partially known symbols
There are 2 transitions out of each state, see Figure 7, lead-
ing to two possible transitions at the location of the partially
known symbol. A case dealing with both fully known sym-
bols and partially known symbols is studied and simulated in
[2].
III. SUMMARY
To achieve any performance gain by re-detection of unpro-
tected protected and unprotected bits must be sufficiently
mixed and there has to be a memory of some kind in-between
received bits. This memory can be inherent in the modulation,
e.g. in differentially encoded modulation, or it may be due to
the channel introducing ISI. It may also be a result of how the
detector works; if the detector uses adaptive channel tracking
the unprotected bits could be re-detected with a better channelestimate, due to more known pilot symbols.
IV. REFERENCES
[1] P. Dent, Invention Disclosure for Decodulation, Internal Document
Ericsson-General Electric, RTP/EGE/CT/Y 93:0009, May 1993.
[2] P. Deutgen & F. Randers, Forward-Error-Control-Assisted Detection,
Masters Thesis 1994:149E, Lule University of Technology, Div. of
Signal Processing, 1994.
Figure 7. A partially known differential symbol
Partially known
symbol
Unknown
symbol
M = 4 Unknown
symbol
Q
I
Q
I
Q
I
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
17/41
Part 3
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
18/41
1(4)
I. INTRODUCTION
This paper is written as to develop some of the ideas that
came up in part 1 and is meant to be a complement. In con-
trast to [1], this paper will treat the performance of the multi-
pass re-detection scheme for re-detecting codedbits. Due to
the interleaving [2], the unknown class 1 bits transmitted inthe current burst, belonging to the current frame, can be
helped by the error corrected class 1 bits transmitted in the
same burst, but belonging to the previous frame.
In Section II the performance of the two-pass receiver is
analyzed, using the fading channel in [1]. In Section III fur-
ther studies on the re-detection scheme, using an AWGN
channel, are done. Three probable effects on the performance
of the re-detection of the coded bits will be discussed:
1) How the use of information, on incorrectly received bits,
in the re-detection affects performance of the multi-pass
receiver.
2) How the adaptive channel tracking influences the re-detection.
3) How the soft information provided to the channel
decoder during detection influences the multi-pass receiver.
II. SIMULATIONS ON A FADING CHANNEL WITH CO-CHANNEL
INTERFERENCE
The simulations are done in order to compare the perfor-
mance of the multi-pass receivers with the one-pass receiver.
The performance of the one-, two- and three-pass receivers,
together with the composite receiver is examined considering
the bit error rate among 15.000 frames containing 159 data
bits each. For C/I values above 14 dB, 20.000 frames wereused in the simulations. Time dispersion of up to one symbol
time has been simulated. The attenuation of the second path,
, is 0 dB. The simulations have been done on a fast fading
channel (fd = 77 Hz) [1].
Figure 1 shows the performance gain in C/I at 1% RBER of
the class 1 bits, of the different receivers, in comparison with
the performance of the one-pass receiver, simulated on a fast
fading channel for different time dispersions [1]. The simula-
tion results indicate that the performance of the multi-pass
receivers considering re-detection of class 1 bits, is worse
than of the one-pass receiver and more or less independent of
the degree of time dispersion.
A. Analysis of class 1 bit performance for the three-pass
receiver.
Figure 2 shows the RBER [1] for the class 1 bits experi-
enced with the one- and three-pass receiver respectively.
According to the simulation results, the three-pass receiver
exhibits no improvement in class 1 bit performance compared
to the one-pass receiver. This confirms the theory that sinceall class 1 bits are considered known (and correct) and the
three-pass receiver in consequence is forced to detect the
class 1 bits in compliance with this information, no improve-
ment will occur. According to the simulations the three-pass
receiver is slightly worse than the one-pass receiver for low
C/I values. This may have an explanation in that for low C/I
values, an entire new (valid) CRC code word can be formed
resulting in an affirmative CRC check from the one-pass
receiver, although bit errors are found among the class 1a bits.
Figure 1. Class 1 performance gain in C/I at 1% RBER, for
time dis persion in the range [0,Ts], fd=77 Hz
0 1 2 3 4 5 6 7 81
0.5
0
0.5
Time dispersion
Performancegain(dB)
Threepass
Twopass
Onepass
Re-Detection of Coded Bits for IS-54
Petra Deutgen and Frode Randers
Ericsson Radio Systems AB
S-164 80 StockholmSweden
Lule University of Technology
Div. of Signal ProcessingS-971 87 LuleSweden
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
19/41
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
20/41
3(4)
B. Simulations with and without channel tracking
In the two- and three-pass detectors, the paths in the trellis
are forced to follow predestinated transitions at locations cor-
responding to known class 1 bits. Because the detection is
coherent with a subsequent differential decoding, at least one
transition out from each state will always be allowed (corre-
sponding to a location with a fully known phase shift) [1].
Due to this, the quick merge of nodes in the two- and three-
pass detectors is prevented where the trellises are pruned.Instead, the paths are forced apart. This side-effect, when
pruning the trellis, might affect the channel tracking, when
the channel-tracking is done according to the coherent states
in the trellis.
Figure 5 shows simulations done with channel tracking and
without channel tracking, using the AWGN channel with the
same conditions as in section C where all class1 bits are con-
sidered as known during the re-detection. According to the
simulations the channel tracking has no negative effect on the
performance of the two-pass re-detection of the coded bits.
Though the side-effect, that the trellis are forced apart, when
pruning the trellis, might still be a cause to the bad perfor-mance for the re-detection scheme in some other sense than
that the channeltracking is not negatively affected.
Figure 4. Class 1 RBER, AWGN, soft decision, [all class1,
class 1a] used
0.0001
0.001
0.01
0.1
1
0 1 2 3 4 5 6
RBER
SNR (dB)
One-passTwo-pass, class 1a+1bTwo-pass, class 1a
C. Simulations with hard and soft information to decoder
The detectors used in the simulations can produce either
soft or hard information to the decoder. The soft information
provided by the detector depends on the certainty of the deci-
sions during detection [3]. In the re-detection scheme, loca-
tions in the trellis, corresponding to known bits and also
surrounding locations, will produce re-detected bits with a
soft value implying higher certainty than the corresponding
bits have got during the one-pass detection. Thus the decodercould get erroneously detected bits with soft values indicating
high certainty. The utilization of soft information in this case
may decrease the performance gain of the decoder compared
to when hard information is used, instead of increasing it.
Therefore, differences in performance of the re-detection
scheme when using soft information versus hard information
is analyzed.
Simulations are done to compare the performance of the
two-pass receiver passing soft information versus hard infor-
mation to the decoder. Figure 6 shows the performance of the
two-pass receiver when using soft information, all class 1 bits
used as known or just the class 1a bits used as known andhard information with the same classification of known bits.
The simulations show that for increasing C/I values, the gain
increases for the two-pass receiver using hard decisions, i.e.
the performance is better than the performance of the two-
pass receiver using soft information. It seams likely that the
current soft decision algorithm is incompatible with this re-
detection scheme.
The comparisons between the performance gain of the two-
and one-pass receiver both using hard information and only
Figure 5. Class 1 RBER, AWGN, soft decision, [channel-
tracking, no channel-tracking] used
0.0001
0.001
0.01
0.1
1
0 1 2 3 4 5 6
RBER
SNR (dB)
Two-pass, soft dec., class 1a, no estTwo-pass, soft dec., class 1a, est
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
21/41
4(4)
the class 1a bits as known, is shown in Figure 7. According to
the simulations, the gain increases when multi-pass re-detec-
tion is used, even though the increase is almost zero.
IV. CONCLUSIONS
The soft decision algorithm employed today [3] should be
modified if a re-detection of the class 1 bits should be useful.
For low to moderate C/I values, the utilization of information
Figure 6. Class 1 RBER, AWGN, [hard, soft decision], [all
class 1, class 1a] bits used
Figure 7. Class 1 RBER, AWGN, hard decision,
class 1a bits used
1e-05
0.0001
0.001
0.01
0.1
1
0 1 2 3 4 5 6
RBER
SNR (dB)
Soft decision, class 1a+1bSoft decision, class 1aHard decision, class 1a+1bHard decision, class 1a
1e-05
0.0001
0.001
0.01
0.1
1
0 1 2 3 4 5 6
RBER
SNR (dB)
One-pass, hard decisionTwo-pass, hard decision, class 1a
on class 1a bits only in the re-detection scheme is preferred
before using all class 1 bits. The way the pruning of the trellis
is done is not affecting the channel tracking negatively, but
might affect the performance of the multi-pass receiver in
some other extent. Comparison of the performance of the
one- and two-pass receiver, using hard decision and only the
bits protected by the CRC, indicates that re-detection can beused to increase the performance of the class 1 bit detection.
The performance gain is negligeable though. The perfor-
mance for different types of interleaving has not been simu-
lated since the interleaving is stipulated by the standard IS-54.
The performance can probably be increased further by using a
more suited scheme of interleaving.
REFERENCES
[1] P. Deutgen & F. Randers, Forward-Error-Control-Assisted Detection,
Masters Thesis 1994:149E, Lule University of Technology, Div. of
Signal Processing, 1994.
[2] EIA/TIA Interim Standard IS-54-B, Cellular System Dual-Mode Mobile Station - Base Station Compatibility Standard, Electronic
Industries Association, 1992
[3] G. Bottomley, Soft information in ADC, Internal Report RTP/EGE/
CT/Y 93:0024, Ericsson-General Electric, July 1993.
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
22/41
Part 4
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
23/41
1(19)
A Functional Description of the Multi-pass
Equalizer
This document is a description of the implementation of the multi-passequalizer as proposed by Paul Dent [1]. The program is based on theREQU, the reference equalizer developed by T/ UR, mod ified in order torun together with other components of the TRX884 DVC simulator.Therefore we will describe the REQU core as w ell.
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
24/41
2(19)
Contents
1 The REQU core 3
1.1 The module Compute R&Phi . . . . . . . . . . . . 41.2 The module Process R&Phi . . . . . . . . . . . . 41.3 The module Synchronize . . . . . . . . . . . . . 51.4 The module Demod . . . . . . . . . . . . . . . 5
2 The Multi-pass Equalizer Scheme 6
2.1 The one-pass demodulator . . . . . . . . . . . . 62.2 The channel decoder . . . . . . . . . . . . . . . 62.3 The channel encoder . . . . . . . . . . . . . . . 72.4 The index calculators . . . . . . . . . . . . . . 72.5 The two- and three-pass detectors . . . . . . . . . . 7
3 Calculation of bit errors 11
4 Parameters defining multi-pass operation 11
5 References 12
6 The SysSim simulation model 13
6.1 The top layer . . . . . . . . . . . . . . . . 136.2 The REQU . . . . . . . . . . . . . . . . . 14
6.3 The multi-pass equalizer . . . . . . . . . . . . 156.4 Bit error calculation . . . . . . . . . . . . . . 16
7 Template for simulations 17
7.1 simparam parameters file . . . . . . . . . . . . 177.2 simparam template file . . . . . . . . . . . . . 17
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
25/41
3(19)
1 The REQU core
As a part of implementing and simulating the multi-pass equalizer wehave ad apted th e reference equalizer, REQU, created at T/ U to the
RBS884 product simulation environment. The REQU itself consists offour blocks: Compute R&Phi, Process R&Phi, Synchronize and Demod(Present code is found in mpass_demod), see Figure 1 and Figure 7. Themodule Compute R&Phi is intend ed as a compat ibility unit where differ-ent types of conversion is made between polar complex representation,cartesian complex representation etc., on samples delivered to theREQU. Compute R&Phi delivers two flows of data, R and Phi, to Process
R&Phi for scaling and frequency adjustment. A feedback mechanismexists in order to compensate for frequency error on the received vectorof samples. Synchronize correlates the a priori known synchronizationword with the received v ector of samples in order to find the p osition of
the synchronization word in the received vector of samples. Also thesynchronizer delivers a channel estimate wh ich is u sed in th e dem odu la-tor to initiate the adaptive process of channel estimation. Demodis thedemodulator and detector. The term demodulator is used because thetransition from the radio signal, simulated as a complex base band sig-nal, to binary (soft) bits takes place inside Demod. The detector is anadaptive maximum likelihood sequence estimator.
1.1 The module Compute R&Phi
Because the REQU is meant to be independent of the environment in
which it is used, a compatibility block exists that p erforms one of several
Figure 1. A schematic illustration of the REQU core
Sequence of
samples from
diversity
path 1
Synchronize
Synchronize
Process
R & Phi
Process
R & Phi
Compute
R & Phi
Compute
R & Phi
Demod
Feedback information on estimated frequency error
Feedback information on estimated frequency error
Sequence of
samples from
diversity
path 2
Detected
bits
Adaptive
channel
equalizer
based upon
SSVE, FSVE
or PFVE
scheme
Carthesian complex
Initial channel estimate
together with position of
known syncword in received
sequence of samples.
Polar complex
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
26/41
4(19)
available conversions. The REQU u ses polar comp lex samples internallyso for instance cartesian complex samples could be converted to polarcomplex samp les in th is block. Compute R&Phi also limits th e phase to a
value between 0 and 2. The samples will at this point be / 4-DQPSK,see Figures 2.
1.2 The moduleProcess R&Phi
The main function of this block is to subtract the / 4 shifts from thesamp les, see Figure 3. As these were introd uced in ord er to enhan ce theperformance of the linear transmitter filter, they are removed withoutaffecting the detection of the signal. Thereafter the signal will be ordi-nary DQPSK. Scaling of the sam ples may also be done w ith one of sev-eral available methods, e.g. scaling to normalize the rout mean square(RMS) value, scaling w ith m ax amp litude or n o scaling. We recomm endscaling with RMS because the delta metrics of the Euclidean distanceViterbi detector may otherw ise take on very h igh values, poten tially cre-
ating numerical problems. A feedback loop exist from the demodulatorand detector, Demod, back to this block and thus makes automatic fre-quency control possible, i.e. automatic adjustments to the phase basedup on information from the d emod ulator/ detector, see Figures 1 and 6.
1.3 The module Synchronize
Synchronize will try to find the beginning of the synchronization w ord inthe sampled sequence employing a cross correlation method. Since thesynchronization w ord has an cyclic autocorrelation feature the cross cor-relation between the sync word in the received sequence and the sync
word itself turns ou t to be a channel estimate. This estimate w ill be used
Figure 2. An example of a signal produced by Compute R&Phi
5 0 55
4
3
2
1
0
1
2
3
4
5pi/4 DQPSK
Inphase
Qua
drature
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
27/41
5(19)
as an initial value for the adaptive channel estimation scheme, see Fig-ures 1 and 6.
1.4 The moduleDemod
Demodis the m ain block of the REQU, see Figure 1 and Figu re 7. It com-prises different channel estimation schemes, a predictor to be used to
combat problems arising from the decision delay in the equalizer andthe equalizer itself.Demodmay be configu red in d ifferent w ays to act asa symbol spaced Viterbi equalizer, SSVE, with a fractionally spaced pre-filter also as a prefilter Viterbi equalizer, PFVE and as a fractionallyspaced Viterbi equ alizer, FSVE.Demodalso takes into account diversitythrough two different diversity channels (distance diversity). The infor-mation from th e diversity and the oversampled (fractionally spaced) sig-nal is combined in the calculation of the delta metrices. For moreinformation on this confer [2] and [3].
Figure 3. An example of a signal produced byProcess R& Phi
1.5 1 0.5 0 0.5 1 1.51.5
1
0.5
0
0.5
1
1.5DQPSK
Inphase
Quadrature
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
28/41
6(19)
2 The Multi-pass EqualizerScheme
The multi-pass equalizer consists of a modified REQU with severalinstances of theDemodmod ule extended with a chann el decoder, a non-interleaving channel encoder and special routines for extracting class 1information from the re-encoded sequence. As is, this system simulatesboth the tw o- and th ree-pass equalizer and a combination of these two,the comp osite multi-pass equalizer.
2.1 The one-pass demodulator
The one pass demodulator consists of the Demod module running inone-pass d etector modus, i.e. it makes no u se of information on the errorcorrected class 1 data bits. Different metrics may be used even thoughthe Euclidean distance metric (SqViterbi) were used in the simulations.Thus a prefilter Viterbi equalizer, PFVE, can be u sed to detect the class 1da ta bits together with th e first estimated class 2 data bits.
2.2 The channel decoder
We use the u sual channel decoder in ou r imp lementation. What we areinterested in here is the class 1 data together with the CRC check flag.Even thou gh w e can not p revent the other p arts of the multi-pass equal-izer from being executed in SysSim w hen the CRC check fails, the gen-eral idea is to only initiate the multi-pass equalizer scheme when we are
reasonably sure of having detected the class 1 data bits correctly. For th is
Figure 4. The multi-pass re-detection scheme
0
detector 1
detector 2
detector 3
"channel"
convolutional
encoder
de-interleaver
convolutional
encoder
(Two-pass)
(Three-pass)
(Class 2 only)
(Class 1&2)
f [.] corresponds to the even rows andf [.] to the odd rows in terms of the
interleaving matrix.
interleaver
F[k] = { }f [k]2
f [k],1
{ }S[k] = f [k]2
f [k-1],1
{ }S[k] =~
f [k-1],1
~f [k]2
~
S[k]~
f [k]1
f [k-1]1
f [k]2
^f [k-1]2
^
{ }f [k-1],1
~f [k]2
~
{ }f [k-1]2
~f [k-2],1
~
f [k-1]2
^
f [k-2]1
^f [k-1]1
^
0f [k-1],1
^{ }
{ }f [k-1]2
^f [k-2],1
^
{ }f [k-1]2
^f [k-2],1
^
f [k-1],1
^{ }f [k]
2
^
f [k-1],1
^{ }f [k-1]
2
^
Z-1
Z-1
Z-1
Z-1
1
2
Z-1
B[k] ={ }b[k]
^B[k-1]
convolutional
decoder
{ }f [k-1]2
^f [k-1],1
^F[k-1] =^
if (CRC[i-1] is OK & CRC[i-2] is OK)
if CRC[i-1] is OKprepare
feedback
prepare
feedback
(Two-pass)
(Three-pass)
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
29/41
7(19)
purpose we use the CRC check flag from the decoder. Keep in mindthough that the CRC check involves the class 1a bits only. There is aninherent p roblem with th is because we may u se incorrect information on
class 1b bits when we experience (heavy) garbling of class 1b bits with-out having a CRC fail situation for th e class 1a bits.
2.3 The channel encoder
After decoding a frame from the ordinary demodu lator/ detector we re-encode it under the assumption of having received all class 1 bits cor-rectly. Observe that the usual interleaving is omitted to avoid a timedelay.
2.4 The index calculators
The index calculator codes all channel encoded class 1 data bits, or a p ar-tition thereof, received from the channel encoder in such a manner thatall zeros are converted to -1 and all ones are converted to +1 while at thesame time setting all class 2, SACCH and CDVCC bits to zero. Also itinserts zeros in p lace of the synchronization w ord. This results in a 312bit vector reflecting all data bits in the received frame, i.e. 16 bits UCH,28 bits SYNC, 122 bits UCH , 12 bits SACCH, 12 bits CDVCC an d 122 bitsUCH. When the CRC check is non-affirmative, the index calculatordelivers all zeros, reflecting that no inform ation is sup plied for the corre-spon ding frame. The tw o-pass index-calculator sets every second row tozero to indicate the lack of knowledge of these bits du e to the interleav-
ing. The three-pass index-calculator interleaves the current burst withthe previous to create a frame, which produces a time-delay. The two-pass index calculator only considers the CRC for the current frame,while the three-pass index calculator also has demands for an affirma-tive CRC for the previous fram e.
2.5 The two- and three-pass detectors
When re-detecting B[k] consisting of the parts {c1[k-1], c2[k]} the frameC[k-1] holding {c1[k-1], c2[k-1]} has been produced by the secondencoder, see Figu re 4. Thus only the class 1 bits in the fraction c1[k-1] can
be used as known . The three-pass re-detection hold s a time-delay whichimplies that when re-detecting B[k] both C[k-1] and then C[k] have beenproduced by the second encoder. All class 1 bits can be used as known,where c1[k-1] is taken from C[k-1] and c2[k] from C[k]. See Figures 4 and7.
The two pass detector makes use of information on class 1 data bits com-puted in the one-pass detector and converted during the process ofchannel encoding and index calculation (see above). Only th e Euclideandistance metric Viterbi is modified to make use of this information andthe two- and three-pass detectors may only be run in this mode. The
idea is that given inform ation on convolut ional- and block coded class 1
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
30/41
8(19)
data bits, i.e. data bits that we may check for correctness, we prune thetrellis to reflect that w e for some samples know wh at ph ase shifts shouldoccur and thu s may increase the ability to detect the interm ingling class
2 data bits correctly. In the actual pruning process we use the 312 bitindex vector, that is aligned with the 312 bit information part of thereceived fram e, wh ile processing th e received signal. At all locations inthe ind ex vector w here the valu e differ from zero, i.e. positions held byknown bits, we assume w e know th ese bits with absolute certainty thussetting the sp ecific -metr ics to infinity. This forces the Viterbi algorith mto exclude all paths not corresponding to the known phase shiftsthrou gh the trellis.
In the three-pass case we perform a regular interleaving after havingencoded the data. The received frame on w hich the re-detection process
is initiated mu st therefore be delayed one frame. All class 1 bits are con-sidered to be known in this scheme.
The composite multi-pass detector combines the class 2 bits from thetwo-pass d etector an d the th ree-pass d etector. The class 1 bits are takenfrom the one-pass receiver. After having received B[k] by the one-passreceiver, both a re-detection ofB[k] by the two-pass detector and a re-detection ofB[k-1] by the three-pass d etector, is initiated. From these tw ore-detected bursts the class 2 bits are taken to form th e class 2 bits frac-tion ofF[k-1]. B[k], holds {c1[k-1], c2[k]} and B[k-1], holds {c1[k-2], c2[k-1]}thus the class 2 bits ofc1[k-1] are taken from the two-pass detector and
the class 2 bits ofc2[k-1] are taken from the three-pass d etector, see Fig-ures 4 and 7.
For a fur ther discussion on this su bject, please see [4].
2.5.1 The restraining of the trellis implemented in the two- and
three-pass detectors
The detection is done by means of a coherent Viterbi equalizer with asubsequent differential decoder, implying coherent symbol detectionwith the aid of the trellis, and then d ifferential decoding of the coherentsymbols.
In differential quadrature phase shift keying (DQPSK), as used in D-AMPS, the information lies in the differential phase shifts rather th an inthe absolute ph ase of the signal. A set of information bits correspond toa certain phase shift, see Figure 5.
If we, pr ior to detecting a d ifferential symbol, have knowledge of oneor both of the correspond ing bits we m ay restrain, or p rune, the (num berof) transitions in th e trellis.
Since some causes to an erroneous detection have been left out by
means of the pruning, we may re-detect a differential symbol with an
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
31/41
9(19)
increased possibility of m aking the correct d ecision. In th e specific envi-ronment of IS-54 we experience both fully known and partially knownsymbols. Due to u nequal p rotection of transmitted bits, we m ay u se theprotected bits, if they are successfully received, for restraining the trellisin a subsequent re-detection of bits with no protection. Based upon thedepth of the interleaving scheme employed, such a re-detection may beperformed on the currently received burst, or on previously received
bursts. Also the effectiveness of this multi-pass re-detection scheme isdep endent on the intra-burst interleaving employed. From the p oint ofview of this method , the performan ce gain is depend ent of the pattern ofinterspersing (fully or partially) known sym bols among un known sym-bols (symbols with a lower degree of error p rotection).
2.5.2 The influence that the restraining has on the trellis
The detector is a TS / 2 fractionally sp aced maximum likelihoodsequ ence estimator (MLSE), with a 4-state Viterbi algor ithm (VA). In th etwo-pass and three-pass detectors the trellises of the VA are forced to
take pred estinated p aths correspond ing to know n class 1 bits. The differ-ential detection of the DQPSK signal is imp lemented by a coherent Vit-erbi detector with a subsequent differential decoder. This implies thatparallel transitions in the trellis are equal since they represent an equaldifference in phase. If bits corresponding to a certain phase shift areknown, the trellis is restrained so that only transitions corresponding tothis known phase shift are allowed. Due to this, the quick merge ofnodes in th e two- and three-pass d etectors are prevented w here the trel-lises are prun ed. Instead , the paths are forced ap art.
Figure 5. A symbol represented by two bits
Q
I
(-1,-1)
(-1,1)
(1,1)(1,-1)
/2
3/2
0
~
~~
~
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
32/41
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
33/41
11(19)
5 References
[1] P. Dent, Invention disclosure of Decodulation, Internal Docum entEricsson-General Electric, RTP/ EGE/ CT/ Y 93:0009, May 1993.
[2] K. Jamal, Equalization for the ADC standard, Internal report T/ U91:260, 1991.
[3] K. Jamal, Fractionally Spaced Viterbi Equalization, Internal reportT/ BU 92:075, 1992.
[4] P. Deutgen & F. Rand ers, Forward-Error-Control-Assisted Detec-tion, Masters Thesis 1994:149E, Lule University of Technology,Div. of Signal Processin g, 1994.
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
34/41
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
35/41
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
36/41
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
37/41
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
38/41
16(19)
7 Templates for simulation
7.1 The simparam parameters file
FADE 7 77TAU 0 2 4 8CIR 4 5 8 10 12 14 16 18SNR 35FREQ_ERR 0CH_SEP 0STEP 3101
7.2 The simparam template fi le
sim build
/* Set RATE */
set **/RATE 1
/* Set simulation parameters */
set **/DOPPLERFREQ FADEset **/dopplerFreq FADEset **/snrDb SNRset **/cOverIdB1 CIR
set **/delay TAUset **/ST1/freqErr FREQ_ERRset **/channelSep1 CH_SEP
/* Set other parameters */
set /LogStat/SimName SIM_NAMEset /LogStat/SimRunName SIM_RUN_NAMEset /LogStat/ResultPathName RESULT_PATH_NAME
set /mpass_dvc/ratrx?/mf1/INFILENAME rat/filter/butt4_165e2_194e3.hzset /mpass_dvc/ratrx?/mf2/INFILENAME rat/filter/iir2gaus3_194e3.hz
cd /mpass_dvc/dfiltAsource dfilt/dfilt.inicd /mpass_dvc/dfiltBsource dfilt/dfilt.inicd /
/*---------------------------------------------------Parameters used to force dfilt to produce (i,q)samples,i.e. carthesian complex samples instead of any
obfuscated (rss,phi) samples that we would have to
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
39/41
17(19)
invert anyway.*--------------------------------------------------*/set /mpass_dvc/dfiltA/t2/bypass TRUEset /mpass_dvc/dfiltA/t2/eqmode FALSE
set /mpass_dvc/dfiltB/t2/bypass TRUEset /mpass_dvc/dfiltB/t2/eqmode FALSE
/*---------------------------------------------------Parameters used to force dfilt to skip the suspiciousladder-mode. Instead we use a simple filter whichonly amplifies the signal with a constant gain = b0*--------------------------------------------------*/set /mpass_dvc/dfilt?/mf22/bypass FALSEset /mpass_dvc/dfilt?/mf22/ladderMode FALSEset /mpass_dvc/dfilt?/mf22/b0 1000
/*---------------------------------------------------The correlation between the carrier and the interfererin the two ray model. This together with the amplitudeof the interferer relative the carrier amplitude maybe used to simulate a flat non fading channel(correlation=1, amplitude=-200).See below for FADE == 0.*--------------------------------------------------*/set **/CORR/correlation 0.7
/*---------------------------------------------------Statistical interval is now set to 200. That meansthat the number of simulations will be broken downinto small pieces on which we may build more robuststatistics*--------------------------------------------------*/set **/statInterval 200set **/COVERICHA/skipNr 100set **/COVERICHB/skipNr 100set **/TXCMOD/skipNr 100
/*---------------------------------------------------Since dmt comprises a program written in pascal aswell as one written in C++, neither one being possibleto instantiate, we must choose different models for
the modulator of the carrier and the modulator of theinterferer. For the carrier we choose the C++ model(implementation model TRUE) and for the interferer thePascal program (implementation model FALSE).*--------------------------------------------------*/set /mpass_dvc/dmtCarr/imp_model Trueset /mpass_dvc/dmtCarr/imp_length 12set /mpass_dvc/dmtCarr/ampl 5100set /mpass_dvc/dmtInt/ampl 5150
/* Set dequdect parameters */
cd /mpass_dvc/dequdect
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
40/41
18(19)
set crphi?/ConversionMode 1set prphi?/AGCMode 1set sync?/FseFactor 2set sync?/ExpectedPos 244
set sync?/CorrelationMode 1set sync?/WndLen 32set sync?/WeightFactor 1.5
/* Set mpass_equ parameters */
cd /mpass_dvc/dequdect/mpass_equ/one_pass_ddtset Weighting TRUEset IsiLp 0.02set FeedbackMode 1set FseFactor 2set NmbDivCh 2
set ExpandedMode 0set SLength 1
cd /mpass_dvc/dequdect/mpass_equ/two_pass_ddt/demodset Weighting TRUEset IsiLp 0.02set FeedbackMode 1set FseFactor 2set NmbDivCh 2set ExpandedMode 3set SLength 1
cd /mpass_dvc/dequdect/mpass_equ/three_pass_ddt/demodset Weighting TRUEset IsiLp 0.02set FeedbackMode 1set FseFactor 2set NmbDivCh 2set ExpandedMode 3set SLength 1
cd /
/* BER calculation */
set **/errDataOut 0set **/statInterval 200set **/skipNr 100
cd /mpass_dvc/ber_calcset one_pass_ber_calc/skipNr 100set two_pass_ber_calc/skipNr 100set three_pass_ber_calc/skipNr 101cd /
#if FADE==0set **/CORR/correlation 1.0
set **/amplitude -200
8/14/2019 Master Thesis: Forward Error Control Assisted Detection
41/41
set **/statInterval 200#endif
#if FADE==7
set **/statInterval 500#endif
#if FADE==77set **/statInterval 200#endif
sim cons
/* Simulate */sim starts
s STEPsim stopexit