logo资料库

A BPSK-QPSK Timing-Error Detector for Sampled Receivers.pdf

第1页 / 共7页
第2页 / 共7页
第3页 / 共7页
第4页 / 共7页
第5页 / 共7页
第6页 / 共7页
第7页 / 共7页
资料共7页,全文预览结束
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. COM-34, NO. 5 , MAY 1986 423 A BPSK/QPSK Timing-Error Detector for Sampled Receivers Abstract-A simple algorithm for detection of timing error of a synchronous, band-limited, BPSK or QPSK data stream is proposed. The algorithm requires only two samples per symbol for its operation. One of the two samples is also used for the symbol decision. Derivation of the s- curve reveals a sinusoidal shape. for digital data S , AMPLED implementations of receivers I. INTRODUCTION signals are growing more popular as components-notably digital signal processors-improve in capability. There is a need for sampled algorithms to replace the continuous-time methods that have predominated heretofore. This paper introduces an algorithm for timing error detec- tion in a receiving modem. Algorithm operations are simple and only two samples of the signal are required for each data symbol. Moreover, one of the two samples also serves for the symbol strobe (i.e., the sample on which the symbol decision is made). The algorithm is intended for synchronous, binary, base- band signals and for BPSK or QPSK (balanced, nonstaggered) passband signals, with approximately 40-100 percent excess bandwidth. Other sampled timing algorithms have .been presented earlier. Mueller and Muller [l] wrote a classic explanation of timing recovery based on just one sample per symbol and requiring decision-directed operations. Note that correct deci- sions in .a carrier system depend upon prior acquisition of carrier phase. not By contrast, the algorithm introduced in this paper is decision directed. Furthermore, clock recovery is quite independent of carrier .phase. Other papers [2]-[5] have foliowed the lead of [l]. A wave difference method different scheme, dubbed the (WDM), was proposed in [6]. In essence, the WDM finds the average location of zero-slope of the received, filtered signal pulses. Numerous samples per symbol appear to tie required for the original method of [6]. Reference [7] extends the WDM, shows how to reduce it to two samples per symbol, suggests implementation details, and provides analyses of performance. Neither of the two sample points in [7] coincides with the decision strobe point. Either four samples per symbol must be taken or else (as in [7]) the two samples per symbol must be interpolated to an effective four samples per symbol. (Interpolation in [7] is accomplished with a digital .delay of a quarter-symbol interval.) Both [6] and [7] treat clock recovery only for baseband signals. The method introduced in this paper, .although developed independently, has resemblances to the WDM of [7]. Its major points of difference are: only two samples per symbol are employed, without explicit interpolation; one sample coincides with the decision instant; and well as baseband signals,. carrier signals are handled as References [I] and [7] contain informative summaries of analog clock-recovery methods, with references. This paper is organized as follows. A model of a receiving modem is shown in Section I1 add some characteristics of the new algorithm are stated in Section 111. A baseband version of the algorithm is developed in Section IV: Derivation of the S- curi.e (sinusoidal for a band-limited signal) is relegated to that the al- Appendix A, while Appendix B demonstrates gorithm is independent of carrier phase. 11. RECEIVER MODEL passband signal is .demodulated Refer to Fig. 1 for a block diagram of a typical I-Q receiving modem. A to baseband in a pair of quadrature-driven mixers. Phase of the local carrier must be adjusted to agree with that of the signal. The necessary carrier-recovery branch is omitted from the diagram and is irrelevant to the clock algorithm and discus- sion. Data filters follow the mixers; they perform receiver filtering to shape signal pulses, minimize noise, and suppress unwanted mixer products. Our interest is in sampled receivers. We do not specify the sampling point other than to say that the filter outputs are available only in sampled form as the pair of real sequences {y,( ) } and {ye( ) } . Timing information must be retrieved from these sequences. Symbols are transmitted synchronously, spaced by the time interval T. Each sequence will have t*o samples per symbol interval and the samples will be time-coincident between +e sequences. One sample occurs at the data strobe time and the other sample occurs midway between data strobe times. The index r is used to designate symbol number. It is convenient to denote the strobe values of the rth symbol- as yl(r) and ye('): As a formalism, we denote the values of the pair of samples lying midway between the (r - 1)th and the rth strobes as yl(r - 1/2) and yQ(r - V2). A timing error detector operates upon samples and gener- ates one error sample ut@) for each symbol. The actions of that detector are the main focus of this paper. The error sequence is smoothed by a loop filter and then used to adjust a timing error corrector. This paper treats only the detector and is not concerned with the loop filter nor with the error corrector. 111. DETECTOR CHARACTERISTICS Paper approved by the Editor for Synchronization and Spread Spectrum of the IEEE Communications Society. Manuscript received September 25, 1985; revised December 23, 1985. The author is at 1755 University Avenue, Palo Alto, CA 94301. IEEE Log Number 8607993. is suitable for both is derived in the sequel. This algorithm tracking and acquisition modes of operation. It is proven in Appendix B that ut@) is independent of carrier phase, so that 0090-6778/86/0500-0423$01 .OO 0 1986 XEEE
424 IiQ Demodulator I I I To Decision Process 4:;:;a {YQ( ) I Filter Timing Error Corrector Error (ut(r)} Det ct IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. COM-34. NO. 5 , MAY 1986 ,That eliminates the effects instead of the actual values. of much noise. If all data filtering has been performed prior to the strobe point, then the sign of the strobe value is ,he optimum hard decision on the symbol and the algorithm effectively becomes decision directed. This expedient is known to improve tracking capability. (But acquisition performance may suffer in a decision-directed operation.) Note that use of the strobe signs, instead of actual values, eliminates the need for actual multiplications in the attractive feature for digital processors. algorithm-an The decision-directed version of the algorithm will be recognized as very similar to the digital transition tracking loop of Lindsey and Simon [8]. We can see a source of self noise in either version of &is algorithm. If the excess bandwidth is less than 100 percent, the zero crossings of data transitions do not all lie midway between the strobe points. There is a scatter of crossing points, centered on the midway point. The average location is correct, but any individual trajectory can depai-t from the average, causing self noise. in this section: One last comment is appropriate The algorithm takes its information from three different sample points in order to produce one timing-error point. There is a delay in computing the error adjusted within the three-point span of the algorithm, so the timing error at the last point in the span does not necessarily remain the same as the error at the first point. Equivalently, the algorithm contains memory. These features must be taken into account in the analysis of the tracking loop. Iv. DEdrVATiON OF ALGORITHM sample. The timing can be -This section develops the timing detector by physical reasoning from data waveforms. Past experience with timing recovery in analog systems is used as a guide for the all-digital detector. Waveform Approach We start out with the problem of recovering timing information from a baseband data stream. To that end; we postulate the existence of an equivalent analog, baseband signal underlying the digital sequence that actually occurs in the processor. on the continuous signal than on the discrete sequence. Any zero- memory operations performed on the continuous signal will commute with sampling, so that equivalent results are obtained by performing the same operations on the discrete sequence. to visualize operations It is easier A, set of typical waveforms is shown in Fig. 2 . Line A shows symbol boundaries (of width T seconas) and line B shows locations of the strobes: one per symbol in the center of each symbol interval. Line C shows a hypothetical baseband signal x(t). Examina- tion will show that the Nyquist-1 criterion is met and that the signal has been moderately band limited. Actually, the signal pulses used for the illustration were raised cosines, which are very close to band-limited Nyquist pulses With 100 percent excess bandwidth. Simple Rectifier: One well-proven method of regenerating a clock wave from data stream is to pass the stream through a rectifier [9]. We use that expedient as a starting point. A square-law rectifier has several advantages: 0 Its noise performance is near-optimum, especially at low SNR [9]. at double the frequency. mathematically tractable. 4 A pure sinusoidal input results in a pure sinusoidal output A square law is almost the only nonlinearity that is Square-law rectifiers in both I and Q arms will recover a important con- clock wave independent of carrier phase-an sideration for acquisition. Fig. 1. Typical modem (simplified block diagram). timing lock can be achieved carrier phase lock. without depending upon prior If BPSK is employed, and if the modulation is in the I channel, then the Q channel terms contribute no information once carrier phase lock has been achieved. Only noise would come from the Q channel after carrier lock. Therefore, the full algorithm of (1) would be needed for best -BPSK timing acquisition, but the algorithm should be, reduced to just the I- channel terms after carrier baseband signal consists of just one channel, cartier acquisi- tion, is not an issue, and so only the {yl( )} terms are applicable. lock is achieved. Similarly, a If a QPSK signal is being processed, then both I and Q arms contribute useful information after carrier lock; both parts of (1) should be retained for QPSK clock tracking. An analysis of the detector characteristic of (1) is given in band-limited signal it is shown that a Appendix A, where produces a sinusoidal s-curve. Once the data-pulse shape is known, that analysis can be applied to determine the gain of the detector. The method proposed here is thought to be applicable for of the signal of approximately 40-100 excess bandwidths percent; this range is representative of satellite communica- tions. It is known that the proposed algorithm has rapidly deteriorating qoise performance with narrower bandwidth, partly because the efficiency of clock regeneration falls off (as will be further noted in Appendix A) and partly because of increasing self noise. This feature is inherent to regenerators with quadratic nonlinearities. A different algorithm, based on a harder nonlinearity, widths. (But we think the independence of carrier phase is unique to a square-law nonlinearity.) would be needed for narrow band- A physical explanation can be ascribed to (1). The detector samples the data stream midway between strobe locations in each of the I and Q channels. If there is a transition between symbols, the average midway value should be zero, in the absence of timing error. A timing sample whose magnitude depends upon the amount of error, but either slope is equally likely at the midway point so there is no direction information in the sample alone. error gives a nonzero To sort out these differevt possibilities, the algorithm examines the two strobe values to either side of the midway sample. If there is no transition, the strobe values are the same, their difference is zero, and so the midway sample is rejected. (No timing information is available in the absence of a transition.) If a transition is present, the strobe values will be different; the difference between them will provide slope information. The product of the slope information and the midway sample provides timing-error information. It may be worthwhile to use the signs of the strobe values
GARDNER: BPSK/QPSK TIMING-ERROR DETECTOR FOR SAMPLED RECEIVER Borders , I , I , I A symbol I C I I ~ ~ I - l + C J l + + + + 4 + + I I I I I I I 1 425 Fig. 2. Timing waveforms. We will start the derivation with a square-law rectifier. Line D of Fig. 2 shows the data stream after square-law rectification. Evident in the picture are a dc component (an inevitable output from a rectifier) plus a double-frequency component at the symbol rate. This protoclock component is equivalent to a pure sinewave interrupted by gaps when there are no transitions in the data. An analog clock-recovery scheme would employ a narrow- band filter or a phase-lock loop to extract the desired clock line and reject the various disturbances. at the symbol frequency, The same approach is feasible in a digital system, but is not very convenient. Proper operation with a filter or PLL scheme would necessitate good reconstruction of the protoclock and that cannot be done with just two samples per symbol. (Two samples per cycle of a sinewave limit of the sampling theorem; the protoclock has a bandwidth wider than 1 / T and cannot be reconstructed from samples at a rate 2/T.) is the upper of Our objective i s not to reconstruct the protoclock, but to does not inherently require determine timing error-which protoclock reconstruction. Examining line D, it can be seen that samples taken at locations of k 1/4T away from the strobe point fall at equal- amplitude, but opposite-slope points on the useful portions of the protoclock. When timing is correct, the difference between those two samples-labeled E for early and L for late-will be zero (in those locations where a data transition exists). If the signal is delayed with respect to the sampling, then the value of one sample increases and the other decreases. The difference between sartiple,values is a measure of timing error. To formalize the method, assign an index r to each timing in the rth symbol sample, so that the two timing samples interval. are denoted E(r) and L(r). This introductory al- gorithm would be ut(r)=E(r)-L(r-l) = x 2 ( ~ + ( r - 1 1 / 4 ) T ) - x 2 ( ~ + ( r - 5 / 4 ) T ) (2) whereas the rth strobe is taken at t = rT + r , and 7 is the timing shift from desired delay. for the in the example, that u,( ) will be in the absence of additive noise, and idealized waveforms used zero when transitions are missing. That festure avoids significant self noise. Note that A slightly different algorithm, E(r) - L(r), could have been employed instead. It would also provide a measure of the timing error and a successful loop could be based upon it. However, a large error sample is generated by this algorithm for many locations where there are no transitions. It is true that an opposite-sign error-sample is certain to be generated later and that the two large samples cancel out in the long-term tracking. However, in the short term, the large error samples contribute to self noise. For that reason, the selected algorithm is superior to the alternative. The same choice, with the same self-noise consequences, will reappear in subsequent develop- ments. Without further comment, we pair giving the best rejection of self noise. will select the sample The algorithm of ( 2 ) . is workable. From experience with continuous systems performance could be attained links. However, it has two deficiencies that should be remedied. [lo] we can anticipate that satisfactory in typical communications Although it needs only two samples per symbol, neither Therefore,, the of those samples is the data-strobe sample. postfilter operations require at least three samples per symbol, thereby placing a greater computing burden on the data filters. 0 . No self noise arises with the idealized waveforms of the illustration. But that happy condition occurs only because the illustrative waveforms are time-limited. When band-limited, time-extended waveforms are used, then self noise will arise to some extent. Let us attack the self noise first. It is well established [l 13 that a suitable prefilter in front of the rectifier, plus suitable postfiltering, can suppress self noise completely. That is the next approach examined.
426 Prefilter Method: Line E shows the output x,(t) of a prefilter which has x(t), from line C, as its input. For time- limited pulses [12], x,(t) is simply the derivative of x(t). For band-limited pulses, the spectrum ofx,(t) is band limited and symmetric about the Nyquist frequency 1 /2 T (See [ 1 11 ) . A protoclock is generated by rectifying x,(t), as illustrated in line F. For the particular, idealized waveforms used in Fig. 2, it turns out that Line F is simply the inversion and level shift of line D. The same arguments on sampling and the same timing algorithm are appropriate. In the absence of a postfilter, it is not apparent that the prefilter affords self-noise relief for band-limited waveforms. A more detailed analysis would be needed to demonstrate that feature. Instead, we merely note that the idealized prefilter'for the idealized illustrative waveform has not relieved the shift of the timing samples from the strobe location. A differentiator, for time-limited pulses, or an optimum likely to be rather prefilter, for band-limited pulses, it is complicated and would add unduly to the computation burden. It has been shown [13] that fairly c k d e approximations to ideal prefilters provide substantial improvement of self noise. Therefore, we of simplicity and restrict the method to very simple prefilters. , Delay Differencing: Let the prefilter or differentiator be approximated by the operation compromise optimality in the interest x d ( t ) = x ( t ) - x ( t - t d ) (3) where td is a suitably chosen delay time. In paiticular, if td = T/2, then the average delay of xd is T/4-which is the time shift between the strobe point and the timing samples that has arisen in the two previous approaches. Line G shows the result if the signal of line C is delay- differenced with a delay of td = T/2. 'Comparison with line E shows similar, but not identical waveforms. The delay-differenced waveform is passed through a square-law rectifier, yielding form. Once again, the information can be retrieved by the algorithm line H, for the example wave- protocloc,k appears and timing-error u f ( r ) = E ( r ) - L ( r - 1). (4) However, now observe that E(r) coincides with the strobe time for the rth symbol; the delay in the differencing network shifted the time for the timing samples and eliminated *e need for a third sample. One timing sample now coincides with the data strobe and the other falls midway between data strobes. (The strobe locations are carried on eacp waveform abscissa as vertical tick marks in Fig. 2 . ) In this roundabout manner we have devised a timing-error detector algorithm that requires only two samples per symbol (one sample coincident with the data strobe), that has some self-noise rejection properties, and that can be performed with minimal computing burden (one subtraction and one squaring per symbol interval). Now let us ,see what improvements are possible. Formai Reductions algorithm 'expression and discover In this section we perform formal algebraic manipulations that there are no useful self noise, on the elements hidden in output. Since their presence could only generate they are eliminated &nd a stripped algorithm is derived instead. the algorithm that contribute S t g t with xd(t)=x(t)-x(t- T/2) x$(t)=x2(t)+x2(t- T / 2 ) - 2 x ( t ) x ( t - T/2). ( 5 ) (6) IEEE TRANSACTIONS ON COMMUNICATIONS, VOL.' COM-34, NO. 5 , MAY 1986 Upon sampling at t = rT + r and rT + r - T/2, we obtain E(r) =x2,(rT+ 7) = x2(7 + rT) + x2(r + ( r - 1/2) T ) -2X(7+FT)X(T+(r-'1/2)T) ~ ( r - 1 ) = ~ 2 ( r + ( r - - / 2 ) T ) + x ~ ( r + ( r - l ) T ) - 2 x ( r + ( r - 1 / 2 ) T ) x ( r + ( r - l ) T ) . -(7) Let the algorithm be u f ( r ) = L ( r - 1 ) - E ( r ) . (8) of sign has no significance in the formal The reversal manipulations or in the processor's computation burden, but assures negative slope at the tracking point of the detector output. See Appendix A. Both elements of (8) contain a term x2(7 + (r - 1/2)T); the subtraction cancels those terms. Collecting terms after the cancellation, the algorithm is composed of the elements u,(r)=x2(7+(r- l)T)-x2(r+rT) + 2 x ( r + ( r - 1 1 / 2 ) ~ ) { x ( r + r ~ ) - x ( T + ( r - l ) ~ ) } . Useful output of the algorithm is the (9) average over many samples, not the value of an isolated sample. Denote Uf(r) = Avg, ut(r) as the average over many samples, so that Vf(7) = Avg { x2(r + ( r - 1) T } - Avg { x2(7 + rT)} + 2 Avg { ~ ( 7 + ( r - ~ / 2 ) T ) ( x ( 7 + r T ) - ~ ( 7 + ( r - l ) T ) ) } . (10) The first two terms must be equal; the ensemble average cannot depend upon the index r because the underlying signal is cyclostationary. Therefore, those averages must cancel. The presence of the x*( ) terms does not contribute to the useful average output; we must suspect them as potential sources of self ,noise.' Therefore,' let us eliminate them. The remaining terms' are of the form U , ( r ) = X ( 7 + ( T - 1 / 2 ) T ) { X ( 7 + r T ) - X ( 7 + ( r - 1 ) T ) } = x ( r - l h ) { x ( r ) - x ( r - l)}. (1 1) This is the proposed timing-detector algorithm for real, baseband signals.'Two such computations, one each from the I and from the Q channel, are added when processing a demodulated carrier signal. The sum'is the'algorithm of (1). APPENDIX A DERIVATION OF S-CURVE Satisfactory design of. the timing loop requires that the detector characteristic-average error 7-be known. That is derived 'for the baseband algorithm of (1 1) in this Appendix. A phase-independent extension to the Z- Q algorithm of (1) is demonstrated in Appendix B. output versus timing Let the underlying, time-continuous signal be a PAM stream with the format x ( t ) = C @ p g ( t - P T ) (12) where this summation, and those doubly infinite. to follow, is assumed to be The sequence {ap} is taken from a binary library where a, = k 1 . We will assume that the ap have zero mean and are uncorrelated. That is, - E(ap)=O
GARDNER: BPSKIQPSK TIMING-ERROR DETECTOR FOR SAMPLED RECEIVER (13) The function g(t) is the shape of the filtered signal pulse. It E(apaq) = 6,,E(a3 = aPq. Apply (12) to (1 has Fourier transform G( f ) . to obtain ut(r) = x apg(r+ ( r - Vz) T - p T ) 1) so a P =' j G(v)ejruT a(r, 4) T 427 (14) indicated multiplications and collect terms, Perform the thereby obtaining double sums containing products aPaq and spas. Take the expectation over the data ensemble to arrive at the average output of the detector: U,(d=E{Ut(r)) P - g ( r + ( r - 1 ) T - p T ) ] = x g(r+ ( r - ' / z ) T - p T ) [ g ( r + r T - p T ) =e g ( r + ( q - l / z ) T ) g ( r + q T ) 4 -e g ( r + ( q - W T ) g ( 7 + ( q - 1 ) T ) 4 where q = r - p . m Then Consider a partial term of the form ( ~ ( ~ ) = g ( 7 + ( q - - / z ) p ) g ( ~ + q T ) = A ( f ) = 1 g(r+(q-1/z)T)g(7+qT)e-jZ*fr dr 1 A(f)ejZuf df. = 1 g ( r + ( q - 1/z)k)e-jZrfl s G(v)ejZru(r+qT) dv dr 1 G(v)ejZTuQT s g ( r + ( q - 1/2)T)e-jzur(f-u) dr dv - m (16) where all integrals are over otherwise stated. Let 7' = 7 + (q - %)T, whereby double-infinite limits (17) m = 0: until If g ( t ) is real, then In the last line we have imposed the restriction G ( f ) = 0 for If1 2 1/T to take account of band limiting and to simplify the no nonzero analysis. That restriction assures overlap between G ( f ) and G ( ( m / T ) - f) for Iml > 1. The only contributing values of m are 0 and & 1. that there is In similar manner, define P(7) = g(7 + (4 - 1/21 T)g(r+ (q - 1 ) T) and, undertaking the same manipulations already shown for (Y(T), we obtain ( 1 5 ) m l G(v)G(;-v)e-jrvT dv. * (23) The quantity of interest is i 4 7 ) - P(7)) Ut(7) = 4 = 2 j ( l / T ) m (- l)mejzrmr/T s C ( f ) G ( T - f ) sin nfT df. (24) * Let us examine this expression separately for each of the three different contributory values of m. It can be demonstrated that 4 m m q = - m m = --m io G ( f ) - l / T + e-jZrr/T * G ( -$-f) sin nfT df)
428 TRANSACTIONS IEEE COMMUNICATIONS, ON VOL. COM-34, NO. 5, MAY 1986 where the asymmetric limits come about because one' of the shifted G( ) terms vanishes in a region where G ( f ) itself is nonzero. This expression is valid for any band-limited g(t); it' can be evaluated by substituting G ( f ) and working out the integrals of (25). Better insight is gained by resolving G ( f ) into its even and odd components. For g(t) a real function we find G ( f 1 = Ge ( f ) +jGo(f) where G, and Go are both purely real, with properties G A f ) = Ge( -f) Go(f) = - Go( - f Further, define the shorthand notation +Ge(f)Go -- f sin nf T df (k )) +Ge(f)Go( -;- f ) ) sin rf T df. (27) By the even and odd symmetry, it can be shown that GR+ = - GR- = GR GI+ = GI- = GI. Applying all of this to (25) gives Ut(r)= -2j(l/T){e'2TT/T (GR+ + ~ G I + ) + e - j 2 a ~ / T (GR- + GI-)} = (4/T){ GR .sin .2nr/T- GI cos 2nr/T} = - (41 T)( G: + G i ) l l 2 sin (2~7-/ T - $) (28) I 0 0 -0.5 I I -0.5 1 ' 2 Normalized Frequency 1.5 0.5 I I I I 0.5 "Normalized I Frequency I f f Fig. 3. Diagram of spectral overlap. error characteristic has a sinusoidal shape: a consequence of the band limiting. Consider a special case in which g(t) is even. Optimum data filtering will match the data filter to the incoming pulse waveshape and that will always result in an even g(t). If g(t) is not even, the receiver is not matched to the incoming pulse. In many receivers, the filter matched and so g(t) will be nearly even. will be at least approximately If g(t) is even, then Go(f) = 0 for allf, so G I ( f ) = 0 also. Furthermore, $ =, 0 and the average detector output reduces to Ut(r) = - ( ~ / T ) G R sin 2 m / T = - ( 4 / T ) sin 2 m / T j G ( f ) 1/T 0 In (29), the integrand The average vanishes at r = 0, corresponding to the center of each pulse, where the eye opening is maximum. G ( f ) G ( ( l / T ) - f), which is sketched in Fig. 3. Only the region of overlap between these two functions contributes to protoclock generation. As excess bandwidth decreases, the overlap region shrinks and the gain of the detector becomes very small. Note differencing) weights the overlap region preferentially. how sin ?rf T (induced by the delay is proportional to the product APPENDIX B EFFECT OF CARRIER PHASE ERROR ' It is desirable that the timing loop be capable of acquiring lock without depending upon prior lock of the carrier loop. In of (1) this section we show that the proposed algorithm provides the same timing-error information irrespective of carrier phase. Therefore, timing can be established prior to carrier phase lock. Represent the fictitious, time-continuous, complex signal out of the data filters as w ( t ) = {a(t)+jb(t)}ejA8 (30) where $ = tan-I(GI/GR) is a timing shift (in radians) caused by departure of g(t) from even symmetry. Observe that the which has the rectangular components x l ( t ) = a ( t ) cos Ae-b(t) sin A0
x2(t) = a(t) sin A8 + b(t) cos A8 GARDNER: BPSKIQPSK TIMING-ERROR DETECTOR FOR SAMPLED RECEIVER (31) where A0 is the carrier-phase tracking error, considered arbitrary but fixed. For acquisition purposes, or for a two- dimensional QPSK signal, the timing-detector algorithm is ut(t)=xl(t- T/2){x1(t)-x,(t- T ) } + ~ 2 ( t - T / 2 ) { ~ 2 ( t ) - x z ( t - T ) } . (32) That is, the algorithm of (1 1)-expressed here in the continu- ous-time domain-is applied to both arms of the baseband signal and the two computations are summed. Substituting (31) into (32), and performing the appropriate trigonometry yields ul(t)=a(t- T/2){a(t)-a(t- T ) } +b(t- T / 2 ) { b ( t ) - b ( t - T ) } (33) which is quite independent of AO. All terms containing A0 have either cancelled, or else combined according to sin2 A0 + cos2 A0 = 1. The two-arm algorithm delivers the same error indication irrespective of carrier phase. Therefore, the timing loop can lock prior to locking, or even closing, of the phase loop. REFERENCES K. H. Mueller and M. Muller, “Timing recovery in digital synchro- receivers,” IEEE Trans. Commun., vol. .COM-14, pp. nous data 516-530, May 1976. C.-P. J. Tzeng, D. A. Hodges, and D. G. Messerschmitt, “Timing recovery in digital subscriber loops using baudrate sampling,” in Conf. Rec. Int. Conf. Cornmun., 1985, vol. 3, paper 37.6. A. Jennings and B. recovery for PAM systems,” IEEE Trans. Commun., vol. COM-33, pp. 729-731, July 1985. M. A. Marsan and S . Benedetto, “Timing and carrier recovery for high speed data transmission over telephone channels,” in Nat. Telecom- mun. Conf. Rec., 1979, vol. 2, paper 24.5. M. A. Marsan, G. Albertengo, and S. Benedetto, “High speed modem with microprocessors: Design and implementation of the synchroniza- R. Clarke, “Data-sequence selective timing 429 tion algorithms,” in Nut. Telecommun. Conf. Rec., 1981, vol. 1, paper B3.4. T. Suzuki, H. Takatori, M. Ogawa, and K. Tomooka, “Line equalizer for a digital subscriber loop employing switched capacitor technol- ogy,” IEEE Trans. Cornmun., vol. COM-30, pp. 2074-2082, Sept. 1982. 0. Agazzi, C.-P. J. Tzeng, D. G. Messerschmitt, and D. A. Hodges, “Timing recovery in digital subscriber loops,” IEEE Trans. Com- mun., vol. COM-33, pp. 558-569, June 1985. W. C. Lindsey and M. K. Simon, Telecommunication Systems Engineering. Englewood Cliffs, NJ: Prentice-Hall, 1973, ch. 9. L. E. Franks, “Carrier and bit synchronization in data communica- tion,” IEEE Trans. Commun., vol. COM-28, pp. 1107-1120, Aug. 1980. F. M. Gardner, “Carrier and clock synchronization for TDMA digital communications,” Euro. Space Agency, Noordwijk, the Netherlands, Rep. ESA TM-169 L. E. Franks and J. P. Bubrouski, “Statistical properties of timing jitter in a PAM timing recovery scheme,” IEEE Trans. Cornmun., vol. COM-22, pp. 913-920, July 1974. U. Mengali, “A self bit synchronizer matched to the signal shape,” IEEE Trans. Aerosp. Electron. Syst., vol. AES-7, pp. 686-693, July 1971. F. M. Gardner, “Clock and carrier synchronization: Prefilter and antihangup investigations,” Euro. Space Agency, Noordwijk, the Netherlands, Rep. ESA CR-984, Contr. 2582/75, Nov. 1977. (ESTEC), Dec. 1976. * Floyd M. Gardner (S’49-A’54-SM’58-F’80) re- ceived the B.S.E.E. degree from the Illinois Insti- tute of Technology, Chicago, in 1950, the M.S.E.E. degree from Stanford University, Stan- ford, CA, in 1951, and the Ph.D. degree from the University of Illinois, Urbana, in 1953. He has been an independent consulting engineer since 1960, active in the fields of communications and electronics. He is the author of the book Phaselock Techniques (New York: Wiley, 2nd ed., 1979). Dr. Gardner is a Registered Professional Engineer in the State of California.
分享到:
收藏