logo资料库

基于log-map的编译码.pdf

第1页 / 共11页
第2页 / 共11页
第3页 / 共11页
第4页 / 共11页
第5页 / 共11页
第6页 / 共11页
第7页 / 共11页
第8页 / 共11页
资料共11页,剩余部分请下载后查看
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 42, NO. U314, FEBRUARYMARCWAPRIL 1994 1661 Reduced Complexity Symbol Detectors with Parallel Structures for IS1 Channels Javan Erfanian, Member, IEEE, Subbarayan Pasupathy, Fellow, IEEE, and Glenn Gulak, Member, IEEE Absrracr - The problem of practical realization of the optimal fixed-delay symbol-by-symbol detection algorithm, which is op- timum in the sense of minimizing the symbol error probability, given a delay constraint D, is investigated. A fully-parallel struc- ture is developed, and through systematic reformulations of the algorithm, the computational requirements are reduced consider- ably. In addition, the problems associated with a large dynamic range such as overflow (or underffow) are (practically) removed. A number of approximations are applied to this simplified paral- lel symbol (SPS) detector that lead to the derivation of subop- timal detectors. One such suboptimal detector is shown to be the same as the minimum-metric Viterbi detector. A brief comparis- on of the SPS detector and the Viterbi detector shows that the former has a slightly better performance at low values of signal- to-noise ratio (SNR) and the latter performs a smaller number of computations (particularly) at higher values of SNR; otherwise, the two detectors are comparable in performance and complexi- ty. I. INTRODUCTION An increasing demand for high data rate transmission over bandlimited channels with severe intersymbol interference (ISI) has resulted in a fluny of activity over the last two de- cades to develop improved methods of equalization 111. Since error probability is the most important performance measure in such applications, it is of interest to develop practical VLSI implementable receivers which optimize some measures directly related to probability of error. Two important criteria in this regard are: maximum likelihood sequence estimation (MLSE) and minimum probability of symbol error. An important breakthrough came with the derivation of maximum-likelihood receivers for channels with jinite memory. Taking advantage of the fact that the effective range of IS1 is actually finite. Chang and I-Iancock derived a sequen- tial procedure [2], in which the number of computations in- creased only linearly (rather than exponentially) with the mes- sage length. Following [21, Abend and Fritchman [3] derived the optimum fixed-delay ‘symbol-by-symbol’ detector, which is optimum in the sense of minimizing the symbol error proba- bility given a fixed delay constraint, D (Le. given aU the previ- ous as well as D succeeding received samples). This is Paper approved by C.P. Jeremy Tzeng, the Editor for VLSI in Communicahons of the IEEE Communications Swety. Manuscnpt received October 1. 1990 and rewsed November IS, 1991. The research was supported by grants from the Natural Saences and Englneenng Research Coma1 (NSERC) of Canada. Some of the results have been reported ln IEEE Paafic k m c‘onf. on Commun., Computers, & Signal Processing, Victona, B.C., Canada. June 89. Canadian Cod. on Elec. & Computer Engg., Montreal, Canada, Sept.89, and GLOBECOM’90, San bego, Dec.90. Authors are wth the Depattment of Electrical and Computer Engmeenng, simpler than the optimum compound detector [4,5], in that the symbol estimation can be carried out before the entire data se- quence is received. Nevertheless, neither this nor related simplifications, as in [61. were thought of as practical pro- cedures and researchers have pointed out the reasons [7-91. Unlike optimal symbol detection, the procedure that has re- ceived tremendous attention in the last two decades is the Vi- terbi algorithm (VA), which was originally introduced in 1967 for maximum-likelihood decoding of convolutional codes [lo], and, after its optimality in the sense of MLSE was real- ized, it was applied to signaling on IS1 channels [8,11,12]. While the structural aspects of MLSE (or the related VA) have received a great deal of attention [13-181, the criterion and/or algorithms based on the minimum probability of sym- bol error have not received the same scrutiny. The main pur- pose of the present paper is to examine an algorithm which minimizes symbol error probability with the objective of developing parallel-structure implemenmtions with low com- plexity. We focus on the practical realization of the optimal fixed-delay symbol-by-symbol detection algorithm derived in [31. First, the algorithm is mapped onto a fully-parallel struc- ture suitable for VLSI implementlition. Then, a number of simplifications are introduced, through systematic reformula- tions of the algorithm. that avoid the computation of exponen- rials ‘and reduce (or possibly eliminate) the number of muiti- plications to be performed. All this is achieved at a price which seems acceptable in practice. In Section IV, a number of suboptimal design considerations are discussed and a few suboptimal symbol-by-symbol detectors are introduced. In Section V, the simplified parael symbol (SPS) detector is compared to the Viterbi detector, where it is shown that a suboptimal SPS detector is identical to the minimum-metric Viterbi detector. 11. OPTIMAL SYMBOL-BY-SYMBOL DETECTION A. The System Model Figure 1 shows the block diagram of a digital tr‘msmission system with pulse ‘amplitude modulation (PAM). The cascade of the transmitting filter. the channel filter, the receiver’s whi- tening matched filter. and the sampler (Figure 1) can be represented by ;in equivalent discrete-time transvend filter with tap coefficients (fk ] [7, p.3551. Then. the output se- quence ( vk ) is given by L (1) where (Ik] is the sequence of information symbols which can vk = x . f n l k - n f q k n=O University of Toronto, Toronto, Ontano, M5S 1 A4, Canada IEEELog Number 9401568. nnon L - I - I Q K M ~ ~ A nn A ~ n n ~ teen Authorized licensed use limited to: DALIAN MARITIME UNIVERSITY. Downloaded on June 8, 2009 at 07:05 from IEEE Xplore. Restrictions apply.
1662 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 42, NO. 21314, FEBRUARYMARCHIAPRE 1994 Fig. 1. Baseband digital transmission system. on any value ik drawn from an M-symbol alphabet t$e (It =+I in the binary case), L is the effective length of the channel dispersion, and ( q k ) are independent, identically dis- tributed Gaussian random variables with zero mean and vari- ance N o 12. The specific problem is to provide a delayed estimate of the transmitted symbol I k - D , given the observed received se- quence v i , v 2 , . . . , V k , where D is the chosen delay con- straint, according to some optimality criterion. B. The Algorithm We consider the optimal symbol-by-symbol detection al- gorithm under a fixed delay constmint, developed by Abend and Fritchman [3] and as presented in [71. The algorithm IS optimum in the sense of minimizing the probability of a sym- hol error. in compdson with all detectors which depend on the same number of received samples. Let v , , v2, ..., vg be the observed received sequence, where k > D 2L.l As is well known, minimization of symbol error probability is equivalent to MAP estimation. Hence, the algo- probabilities nthm ( V k , ..., V i ) for the M possible symbol VdUeS p ( ! k - ~ =Ik-’ and chooses the one with the largest probability [7, p.3871. posteriori computes the The MAP estimate of the information symbol at time a X: -D , denoted I,, , is given by = arg { max 1t-D I, 1, D * I . . . C uk(Ik? .. , I M ) I n A (2) In (2), the expression arg ( ,G ( a ) that satisfies the function G ( - ) , the term 1 k - n } is equal eo the value of ( ) is the Ik-D summation over all possible values of I k , and the function uk ( . ) is obtained recursively from h 4 A U k ( I k I ..., I k - D ) = P ( V k A h I1k, A . . . 7 I k - L ) ‘(I,) h U k - l ( l k - l , ..., I k - D - 1 ) A (3) /’bo-, where P ( I k ) is the a priori probability of the information symbol I k and p ( . ) denotes the probability density function of the received sample conditioned on the possible values of the information symbols and is given by 1 The algonthm for the case D < L (also given m 131 ) is sundar to the w e D 2 L presented m this paper, except that it considers L (rather than D) most recent symbols for the recursion. C. The Computational Complexity Using (4), the recursion in (3) can be replaced, for statisti- cally independent, qui-probable (i.e., P(I, ) =PI ) input data, by U‘k(;k, ., i k - D ) = U L ( i k , ...) T k - D ) x ( =/PI ) k x f , [ k - J ) 2 1 N o 1 A 1 L I”0 I\ 1 1 =eXp -(Vk- L., x u ’ k - l ( I k - 1 . ..., I k - D - 1 ) (4) Using (3, the initial vdue for the recursion in (4), is obtained from ub+l(iD+l?...?il )=exp { - x ( V k - x & f i k - J ) 2 / N 0 D+1 k=l L /=o 1 (7) The MAP estimate of the information symbol, at time k - D , is then given by 1k-D = arg ( m a . ‘ ’ 1, * I, I*-,+, U’k ( I k , ..., 1k-D ) } n A (8) L For simplicity, we only consider M = 2 (binary signaling) in this paper. The results can be simply generalized to any alpha- bet size. In (6), for each received sample vk (or, alternatively, for each symbol estimate), 2L+1 exponentials need to be com- puted. The exponentials cannot be replaced by their ex- ponents, because they are added rather than multiplied. In ad- +- 2L+1 multiplications required dition, there is a total of 2”’ for the estimation of each symbol, ;is dictated by (6). We have Ik-, l2 for which there may be different ways of implementation in- cluding using a table look-up. There are also 2O additions, as suggested by (6), and 2 ( 2’ - 1 ) additions, as required by (8). Furthermore, there is one binary comparison needed in (8). The operations required for the eshmation of each symbol are summarized in the first column of Table 1. ignored the operations involved in obtaining ( v k - c The intimidating computational burden of the above algo- rithm is apparent from Table 1. The procedure involved is particularly complicated due to the large number of the slow and composite operations of exponentiation and multiplication required for the estimation of each symbol. In addition, there is a large dynamic range associated with the computation of exponentials. In a typical floating-point representation, this I “ ) A Authorized licensed use limited to: DALIAN MARITIME UNIVERSITY. Downloaded on June 8, 2009 at 07:05 from IEEE Xplore. Restrictions apply.
ERFANIAN et al.: REDUCED COMPLEXITY SYMBOL DETECTORS leads to ovefiow (or underflow) problems. A practical reali- zation of this algorithm, which is the focus of this paper, is not possible without challenging its computational burden. COMPLEXITY OF SYMBOL DETECTORS TABLE 1 I Exuonent'n Multipl'n Addit'n I/ 2~ II - II 2 N + 2 Y - 3 N - 2 2.5N+2 -- - 3Y I - I I 2Y Slwiv'gsq. I -- 11 (D-L)xY I ( D - L ) x Y I I 111. SIMPLIFIED PARALLEL SYMBOL D E T E ~ O R A Parallel Structure To exploit the structure inherent in the algorithm 'and to take full advantage of its parallelism ,and reguhity, we follow a procedure (as in [19] ) towards a design that is suitable for VLSI implementation [20-231. First, the recursive algorithm is mapped onto a p,dlel ,array structure. To simplify the notation in (6), let i = O In (9) and (IO). the time index k is chosen to match the time index of the received data v k and the index j is the decimal value. in the range j = O,1. . . . ,2'" - 1 , corresponding to the hintmy representation of a specific path (or sequence) mong the paths given by all possible values of the D + 1 most recent information symbols. At time k, the index j can be ob- tained from where the function < x > is equal to x for positive x and zero otherwise. The 2'+' paths, at anylygive? time k, coArrespond to possible @ I ? S of the set { I k - D , I k - D + I , ..., l k } (e.g. if a l n = l . then { I k , } = ( k 1 , f l 1, rtnd j = o , 1.2. 3). Then. with N 2' , the algorithm defined by (6)-(8) can 1k-l l be rewritten as follows. [::: 1663 (1lC) rk-D = ar8 ( rt)a xi" , 'E1X;] ] lt-0 j = N Note that the expression in brackets in (1 la) is the same in (i2a) the computation of both X i i and X i l + Let Yf =xi + X ~ + N , i=O,1, . . . , N - l Then. (1 la) can be rewritten as - ,2N-1 = Y[$.J x e*'"' , j = o , 1, (12b) where the floor function la] denotes the greatest imeger not greater than a. To exploit the parailelism in the recursive algorithm ex- pressions given by (12), we first consider the index space (i , k) of (12a), as in [24], shown in Figure 2(a). If one node in this index space is allocated to the computation of each l': and the dependencies between nodes in each discrete time step are represented by directed arcs, a dependence graph [191 (DG, from which a parallel suucture can be obtained) can be derived for the symbol-by-symbol detection algorithm. It must be noted that, according to (12), Y! (the output at each node) is only a function of two outputs ( Y t l , ; ~ and Y~;:N,,~J) at hme k - 1 . Hence, the DG illustrated for the case D = 2 in Figure 2(b) represents the recursion defined by (12). k r 1 2 ... k+D m * . a 0 1 N- 1 S t a a I 0 0 T i - .-I"." 0 k- 1 k k+l ... Fig. 2. Derivation of the dependence graph: (a)lndexspaceof(12)and(llc), (b) DG for the case D = 2, N = 4.
1664 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 42, NO 21314, FEBRUARYIMARCWAPRL 1994 Let us define a state vector Sk, given by one set amongst all the possible values of the D most recent information symbols, D + I (19N a , where min* (xf , x: = mint xf[ , x: ) + qf,, (19b) and @f,, is given by (18). Using (13) in (llb) and (12b) gives Xf+’ = C j ~ : , iz0.1, * * . , 2 N - 1 D + I ( 1 9 ~ ) k = l x, k - -yll/2j k - 1 +pf;, i = 0 , 1, . . . , 2 N - I ; k > D + 1 (19d) Note, from (18) and (19), hat the knowledge of the noise variance, N~ / 2, is now used in the computation of only. Also, from (I@, - N o In 2 2 @! ; < 0 , and is signiiicant onlv for small values of I 1. This is further discussed in Section Authorized licensed use limited to: DALIAN MARITIME UNIVERSITY. Downloaded on June 8, 2009 at 07:05 from IEEE Xplore. Restrictions apply.
ERFANIAN et ai.: REDUCED COMPLEXITY SYMBOL DETECTORS IV. A significant simplification of the algorithm (19) occurs when only yf is computed at every node ( j , k ) and the factor is tabulated explicitly as a function of 1 at,, I . Figure 4 $:,, shows the resulting simplification in the processing required at each node. k Y f Fig. 4. Processmg required at each node after simplification. (19). Similarly, using (13a) in (1 IC) and applying the concept of Jacobi’s logarithm, the MAP estimate of I k - D , in the new structure, is obtained from f k - D = urR(win[ykt~).yk(l)] I (20) where 1, -D In Eqn.(21), 1665 additions. Note that if the optmal expressions (21) are used in the computation of y k ( 0 ) and y k ( 1 ), each binary comparison will be followed by one lookup-add operation. However, the approximation given by (23) is justified by the low sensitivity of the algorithm to the additive look-up term given by (18). This is further discussed in Section IV below. Note (by comparing Figures 3 and 4) that all multiplica- tions by (- 1 /No ) in the computation of e-””’, and all ex- ponentials are removed, and the multiplication inside every node is replaced by one addition, ‘ail at the expense of simple operations of compare-select and look-up (one per node) and an (affordable) extra complexity in symbol estimation ((20) replaces (llc)). The result is a simplified parallel symbol (SPS) detection algorithm (19)-(23) with a fully-parallel struc- ture containing N nodes where the computations required at each node are simplified to add-compare-select followed by lookup-add (Figure 4), and where the storage of surviving se- quences is not required. This algorithm is optimal if the sym- bol estimation given by (20) is performed using (21) and is near-optlmal if (23) is used. C. Further Simplification for D > L By taking advantage of the fact that each state in the DG, derived in Section IIIA, spans D information symbols whereas the terms (pf: }, given in (lo), span only L informa- tion symbols, a further simplification is possible for the case D > L. Using (19d) in (194, we get Y;k = min* [(Yes;] + d (24) 9 ( Y f ( I : N ) / Z ] $+N )] 9 min*~a~,a~,--..a~_l)~min(ao,al, - . - , u N - l ) - - W N o + e-A,/No + ... + e-Av-j/No No b ( e ) (22) But i = O , l , ..., N-1; k > D + 1 k - PI - P1+nxz‘” k 9 where AI = a, - inin (ao, a , . . . , aN-I ) , I = 0, 1, ... , N-1 -A.lNo Note that one of the (Al ) in (22) is zero and the remaining are positive, making one of the exponential terms in (22) equal to ‘1’. As AI increases. e in (22) decreases and becomes negligible compared to ‘1’. Consequently, a near-optimal ap- proach could be to keep the two smallest Ai only, or, instead, if a ‘tree’ search is used in finding min( Q O , a 1 , .-- , U N - ~ ), to apply the table look-up only to the last binary comparison, as shown in (23). This way, the same look-up tzzble used for the recursion may be used for output generation (symbol estima- tion). In this case, (21) may be approximated by Equations (20) and (23), used for symbol estimation, in- volve 2 N - 1 binary comparisons, 2 look-up operations, and 2 n=O, 1, . * . , P - L ; 1=0,1* . .. ,2L+‘-1 Therefore, using (25) and the identity (25) m i n * ( A + C , B + C ) = min*(A , B ) + C (26) proved in Appendix A, (24) can be rewritten as Yf = min* ( YfiJJ Yf(rf~)/zJ 1-k d (27) i=0,1, * - . , N - l : k > D + l Let $=minu (yf , ~ f + ~ / ~ ) , i=O, 1, . . . , N 12- 1;k > D(28a) Then, using (28a) in (27) gives k - 1 y I - Z ~ ~ / Z J +p:, i=0,1, . . * , N - l : k > D k - (28b3 Using (19) ‘and (25), the initial conditions can now be obtained from D yf = x p f , i=0,1, N-1 . a * , (28c) k =I The MAP estimate of 1k-D is obtained f ” (20), as dis- cussed in Section B above. Using (19d) in (21), we obtain Authorized licensed use limited to: DALIAN MARITIME UNIVERSITY. Downloaded on June 8, 2009 at 07:05 from IEEE Xplore. Restrictions apply.
1666 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 42, NO. 21314, FEBRUARYMARCHIAPRU 1994 'select' operation is not counted explicitly since it occurs in parallel with the look-up operation. Nevertheless, considering that a multiplication is a few times more complex than an addition, a binary comparison, or a look-up operation. and that the complexity of an exponentia- tion is yet several times that of a multiplicahon, the substantial reduction in overall complexity is apparent. To this, one can add the other additional benefits: The (serious) problems asso- ciated with a large dynamic r&ge, such as overflow or underflow, are (practically) avoided by replacing the summa- tion of exponentials by values comparable to their exponents; and, finally, as stated earlier, the exploitation of the parallel- ism inherent in the algorithm has resulted in the derivation of a parallel structure, suitable for VLSI implementation, with a speed-up factor of N compared to a serial implementation. IV. MORE SUBOPTIMAL DETECTORS Simulation results show that the SPS detection algorithm derived in Section I11 is quite robust to uncertainty in our knowledge of the noise variance N o / 2 and. generally, it is re- latively insensitive to the size of the look-up table (18) espe- c d l y at moderate to high values of SNR. The significance of the look-up factor as a function of S N R (18) is illustrated in Figure 5 for a few values of SkJ (17). From (l8), @:., = 4$, (St, 9 SNR ) Consequently, the results of Figure 5 are independent of the channel characteristics. It can be seen that, first of all, only at relatively large small values of S$ (say less than 2 ~ ~ ) quantization intervals (say 16 levels for the entire range), need , 1.39 1.20 I bkj Fig. 5. Size of the look-up faaorvs. SNR. Using (29, (26). and the identity J *l min*(A, B, C, D ) = min min*(A , B ) , min*(C, also proved in Appendix A, (29) can be rewritten as y k (0) = min $-' + min* ( p.6 , pf 1, yi-' + min* ( p; , pi 1, (3 la) *i . . . , y&;i-l +min* ( p i p z 1 ) ] . . . , yhL! 1 + min" ( pk-2 , pN- k (31b) The optimal SPS detection algorithm, given in (19)-(22) can be replaced by (20), (28), and (31) for the case D > L . The re- cursive equations (19) are replaced by (28), in which the number of computations are reduced by a factor of 2, and (21), used in (20) for MAP symbol estimation, are replaced by the simpler equations (31). The simplified algorithm can be represented by a DG, in which the nodes output { z! 1 , given in (28), with the same topology as that derived earlier in this paper but with 2D-' nodes (instead of 2' nodes). It must be noted that insofar as the recursion in (28) is concemed, the DG could be further collapsed to one with 2L nodes. However, thts IS restricted by (20) and (31), in which the { y: ] that span D symbols and are present in the 2 D - 1 nodes, are needed for the optimal symbol estimation. This restnction is relaxed in the next section where more suboptimal symbol detectors are considered. As discussed in Section III.B, a near-optimal approach is to replace min* ( . ) by min ( . ) for all comparisons in (3 1) except for the final one (i.e. the one outside the square brackets in (31)). The complexity of the near-optimal SPS detection algo- rithm is given in the second column of Table 1. The exact companson is a function of the specific design approach, the technology, and the comparison criterion used. Again, the computations required to obtain (vk - EA 1k-J )', common to all algorithms considered, are not included in Table 1. Also, to perform each lookup operation, a St, (17) which is the difference between some yf and yf, in (28a), must be ob- tained. In practice, a look-up operation always follows a com- parison, as given in (19b), and thus may be combined with it. First, St, may be obtained, then, its magnitude is used in the table look-up operation and its sign bit is used to select the result of comparison. Also, the time needed to perform the J = o L - Authorized licensed use limited to: DALIAN MARITIME UNIVERSITY. Downloaded on June 8, 2009 at 07:05 from IEEE Xplore. Restrictions apply.
ERFANIAN et al.: REDUCED COMPLEXITY SYMBOL DETECTORS 1667 to be tabulated (hence a small look-up table) and, secondly, the look-up factor becomes negligible for moderate to high values of SNR. This can lead to the derivation of suboptimal detectors. One such detector, referred t~ zis SubopfimJ Deeaor 'Al', avoids the look-up operation (Le. ignores ( $f,, ) ) in the re- cursion (28) and reduces the processing required at each node to add-compare-select (ACS) only. Another one, Suboptimal Detector 'B', avoids the look-up operation both in the recur- sion (28) and in the symbol estimation (20),(31). In other words. each function min'(.) is replaced by the function min(.). To derive a simple algorithm for Suboptimal Detector 'B', we proceed as follows. Using (20), replacing min" ( - ) by min( .) in (31). and interchanging the arguments of the com- parison. we obtain I,-D=arg{min rmin(yd-1 ,yi;.j )+min(pd ,pf ), I,, min(y:-',yK+l ) + m i n ( ~ 2 . ~ 3 ) , , k k where (28a) is used in the second line of (32). We recall that whereas ( y f ) , given in (a), span the D most recent information symbols, (zft 1, given in (28a), only span the D - 1 most recent information symbols. However, ,der replacing min* ( . ) by min (. ) in (28a), it can be noted khat 2; is the minimum of yI" and y : + ~ / 2 which differ only in f k - D . Therefore, $very time if' is computed, the argument of the comparison, 1k-D. must be stored. In other words, the reduction by a factor of 2 in area (or folding of 'space'), by mapping the 2' members of the set ( y/j , y: , . . . , yN-I } onto the ZD-' members of the set ( zd , z: , . . . , zi/2-1 1, is accompanied by the introduction of 2D-1 surviving symbol es- timates for Ik-D, each associated with one of (zf } . Considering (25), the same approach, given in Section 1II.C that led to the mapping of the set ( yd , yt , . . . , yft-l ] - , zk12-1 1 may be applied repeated- onto the set ( z t , z: , * e ly, for a to obtain a set ] with only 2L components. Each map- ( qt , qf , ping introduces a surviving symbol associated with every member in the set and the D -L mappings introduce 2L sur- total of D - L , times, k viving sequences. each of length D -L. Therefore, the algo- rithm for Suboptimal Detector *B', obtained by applying the mapping used to derive (28) and (32) D - L times, is as fol- lows. _ k - l + pf: . &;,+2"-' Yfi = - 1 - 1 l l l U l \ YL1/2j 1, 4 i=O,l, * * + , 2 L - l ; k > L + l t &+2' k ), i33a) L+I d+' = rrlin( c p: - l k - D = arg (Fin( & 7 qf 7 k = l 1 , 1 I r a L + I c P!+2L ) * * * 9 q$"-I ) 1 k=l (33b) (33c) Equation (33) can be represented by the DG derived in Sec- tion IIIA (Figure 2(b)) with 2L nodes, where each node-com- putes (33a). Not only is qk computed, but the surviving f k - L is also stored at each node. In (33c), ik-D is obtained from the surviving sequence which corresponds to the node with min(q6 , qf , . . . , &-I though this algorithm, derived for the case D > L, is also valid for D = L may be verified by replacing min' ( . ) by min ( . ) in (19),(21). ). That A hybrid of the optimal SPS detector and Suboptimal Detector 'B', referred to as Suboptimal Detector ' M ' , may also be derived. This can be obtained directly from the optimal SPS detection algorithm (20),(28),(31) through an approach similar to the one used to derive the 'B' algorithm. The only difference is that min' ( . ) and min ( e ) are taken to be equal in the symbol estunation (20),(31) but not in the recursion (28). The result is an algorithm which is the same as (33), except that min( .) is replaced by min* ( . ) in (334 and (33b). The complexities of Suboptimal Detectors 'A2' 'and 'B' are displayed in Table 1. The insignificance of the look-up factor with increasing S N R suggests that the performance of these suboptimal detec- tors should approach optimal performance as S N R increases. Figure 6 verifies this for 'B', for the specific channel and the delay constraint indicated. The curve labeled 'Threshold Detector' is obtained by ex,amining the sign of the received symbol vk Only (ignoring the channel memory) for Symbol es- timation: - I k (ThreshDef.) = sgn ( vk ) where sgn ( x ) is - 1 for x < 0 and + 1 for n 0. Furthermore, the lower-bound curve labeled 'No ISI' (for l k =+1), obtained not time-dispersive, represents P, = ( e$c( 1 / 6) 1 / 2 . by assuming that the additive white Gaussian noise channel is The accuracy of the simulation results throughout this work has been such that the standard deviation for each point is less than ten percent of the mean. Moreover, simulations with a variety of channels indicated that a table size of (as low 'as) 16 values was adequate (Le. only 16 values of ISfj I, at uniform steps, in the range ( 0, 2 N o ) were tabulated). V. COMPARISON WITH THE VI'ERBI DETECTOR The Viterbi algorithm (VA) is an efficient computational method for implementing MLSE. Let IJ = ( I I , 12, * * * , I, ) be Authorized licensed use limited to: DALIAN MARITIME UNIVERSITY. Downloaded on June 8, 2009 at 07:05 from IEEE Xplore. Restrictions apply.
1668 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 42, NO. 21314, FEBRUARYMARCHIAPRIL 1994 I 0.0051 I 0 I 2 4 T I 6 - \ I I 8 0 ~m (a) 1 - 1 I I 2 1 1 In practice, the variable delay involved in symbol detection is replaced by a fixed delay constraint through truncating the length of the surviving sequences to D most recent symbols. If D is sufficiently large, there is a high probability that all the surviving ‘paths’ at time k agree up to time k - D [8,26]; if they do not agree, a decision (according to some sthategy) is forced on the symbol 1k-D. It is reported that the loss in perfor- mance, due to this suboptimal decision procedure, is negligi- ble if D 2 5 L 171. In practice, values of D in the range ( S L to 10L 1, depending on the values of SNR, are used. Furthermore. in the VA, there are different strategies to ‘force’ a decision, in case the surviving sequences at time k do not agree up to time k -D [8]. A few of these strategies are the ‘majority decision’ rule (choosing the symbol suggested by the majority of the surviving sequences), the ‘minimum memc’ rule (choosing the symbol suggested by the path with minimum metric), and the ‘arbitmy selection’ rule (choosing the symbol suggested by an arbitrary path). The recursion in (35) can be represented by the Viterbi trellis [261 which has the same structure as the SPS detector’s DG (Figure 2(b)). The Viterbi trellis may also be considered as its DG [191 and may be used directly for its VLSI imple- mentation [141. It consists of 2L nodes where the processing at each node is the add-compare-select (ACS) given in (35). Based on this representation, (35) may be rewritten as i = O , l , * * * , 2 L - l : k > L + l 441-1 = lQin( c pf , c ! d + 2 L ) L + l L+I 1 , k = l k=l (36b) The processing required at each node of the Viterbi trellis, given by (36a) and (36b) is shown in Figure 7. The estimate according to minimum-metric of the information symbol I,-,, VA. is then given by ., Ik-D = arg {win( q i t 4: 3 Ir -D ’ .. 3 q$-1 ) 1 ( 3 6 ~ ) Pf 4: Pf+P Fig. 7. hcessing required at each node of Viterbi trelhs. Fig. 6. Probability of a symbol errorvs. SNR (D=L=4] thansmitted the sequence of information symbols ‘and V, = ( v I , v 2 , . . . , V J ) be the sequence of the received sam- ples (at the output of the receiver’s whitenmg filter). Follow- ing[7, p.3951, MLSE of the sequence IJ is based on the maax- imimtion of the joint-probability density function ~ ( V J ~ I J ) = P ( v J , “ ‘ , v i I IJ, . . . , I I ) = n P ( V k I l k , l k - L , * ‘ * , l I ) J k=l (34) where the marginal densities on the right hand side of (34) are considered to be independent for additive white Gaussian noise. If the length of the channel dispersion (the number of IS1 terms) is L (finite), a recursive algorithm to estimate the infor- mation symbols based on MLSE can be used as follows. Upon reception of the sample v k , the metrics P A I =o L 1 A lb -L (35a) are computed. The second term in the square brackets, in (Ma), is the branch metric and the sum the path metric. For a binary alphabet, (3%) involves computation of 2L+1 path pemcs and selection of 2L surviving path memcs. Also, the I k - L suggested by each surviving path metric is stored, hence the storage of 2L surviving sequences, At each stage, a deci- ,I,,,), 1 I m < k , if all the sion will be made on the set ( I I , 2L surviving sequences that terminate in the symbol Ik agree on its value. Otherwise, the decision is deferred. The initial values, ( wL+l ( . ) 1, are given by wk(l 1 , .... I L + k ) = rain V+~(I I , ..., I ~ - ~ ) + ( v ~ - A fi I ~ - ~ ) ~ Authorized licensed use limited to: DALIAN MARITIME UNIVERSITY. Downloaded on June 8, 2009 at 07:05 from IEEE Xplore. Restrictions apply.
分享到:
收藏