Professional Documents
Culture Documents
6.equalization For MIMO-OfDM Systems With
6.equalization For MIMO-OfDM Systems With
Abstract—We investigate multiple input multiple output equalization process [8]. A different approach from these
(MIMO) orthogonal frequency-division multiplexing (OFDM) is trellis-based equalization, which have traditionally been
systems that operate with insufficient cyclic prefix (CP). Us- an effective method for combatting multipath interference.
ing a CP shorter than the channel delay spread can enable
a significant improvement in bandwidth utilization or range However, only a few trellis-based equalization techniques have
extension for OFDM networks at the cost of increased inter- been proposed for insufficient CP OFDM systems [9], [10].
symbol interference (ISI) and inter-carrier interference (ICI). Although both techniques can achieve the performance of
We first analyze the effect of ICI and ISI on the received signal. sufficient CP transmission even when the channel delay spread
A bi-directional M-algorithm (BDMA) is then proposed for high- far exceeds the CP length, their designs are limited to single
performance trellis-based equalization to construct an iterative
interference mitigation and detection process. Simulations show input multiple output systems. The extensions to MIMO would
that, after only 2 iterations, the bit error rate (BER) of the lead to impractical complexity. Motivated by the performance
proposed equalization scheme can converge to that of a sufficient- achieved in [10], we investigate trellis-based equalization for
CP system even when the channel delay spread is 6 times longer insufficient CP MIMO-OFDM systems.
than the insufficient CP. In this work, our main contribution is an iterative trellis-
based equalization method for insufficient CP MIMO-OFDM
I. I NTRODUCTION
with practical complexity. We starts by analyzing the insuffi-
In OFDM systems, the CP overhead can be significant, espe- cient CP induced interference and its effect on MIMO-OFDM
cially for long range transmission. For example, in LTE/LTE- transmission. From the interference model, we propose an
Advanced [1], the extended CP length is about 25% of the efficient receiver design for insufficient CP MIMO-OFDM.
useful data transmission time. If the OFDM system can still First, the ISI and part of the ICI are cancelled by feedback of
provide satisfactory performance using a shorter CP, there is detected data. Then, the BDMA algorithm is proposed to build
potential for significant improvement in bandwidth efficiency. an effective trellis-based scheme for equalizing the remaining
Alternatively, longer channel delays can be tolerated for a ICI. This offers a fast convergence of the iterative reception
given CP length, which extends coverage. process. One of the key differences between the developed
Insufficient CP in OFDM transmission leads to interference equalizer and [9], [10] is that the equalizer trellis state is
in the form of ISI and ICI, which affects the data detection defined by desired sub-carrier symbols only. This allows a
process and, if ignored, can lead to a large performance significant reduction in complexity for MIMO systems. The
degradation [2]. MIMO-OFDM systems further complicate second difference is that developed BDMA involves a bi-
receiver design. To alleviate this problem, a number of data directional detection process to provide a good approximation
detection methods for insufficient CP systems have been pro- of the remaining ICI, and thus improve overall detection qual-
posed [3]–[8]. Insufficient CP MIMO-OFDM transmission can ity. In addition, to further decrease the detection complexity,
be equalized by a time domain (TD) finite impulse response the M-algorithm [11] is incorporated into the BDMA process.
filter, which can shorten the MIMO channel response (to be Simulation results show that, with only 2 iterations, the BER
within the CP) [3]. In [4], frequency-domain (FD) per tone of the proposed BDMA equalizer can closely approach that of
equalization (PTEQ) was proposed. Precoding techniques are a sufficient CP system even when the channel delay spread is
used to remove the distortion due to insufficient CP in [5]. In more than 6 times the CP length. This is equivalent to a 84%
[6], spatial and frequency degrees-of-freedom in the received reduction in the bandwidth reserved for CP overhead.
sample vectors are considered for interference suppression.
Another approach is to employ iterative tail cancellation and II. S YSTEM M ODEL AND I NTERFERENCE F ORMULATION
cyclic reconstruction to eliminate ISI and ICI as shown in [7], We consider a MIMO-OFDM system with 𝑁𝑇 transmit and
[8]. 𝑁𝑅 receive antennas and using A-ary quadrature amplitude
Most of the above techniques are either: 1) Not designed modulation (A-QAM) for sub-carrier modulation. Data bits
for the case of channel delay spread being significantly longer are mapped to a complex valued symbol 𝑋𝑣,𝑚 (𝑘) ∈ 𝑨,
than the CP [3] or 2) require modification to the transmitters where 𝑨 is the A-ary constellation set, and 𝑣, 𝑚, and 𝑘
[5] or 3) require a channel decoder involved in the iterative denote the indices of the transmit antenna, OFDM symbol,
out by choosing the sequence that maximizes the likelihood It is trivial to see that a single state of our trellis can only
provide a hypothesis for the desired sub-carrier. In order to
𝑝(𝒀 1 , . . . , 𝒀 𝑁𝑅 , 𝑿) = 𝑝(𝒀 1 , 𝑿) . . . 𝑝(𝒀 𝑁𝑅 , 𝑿), (14)
provide the hypothesis for the ICI term, a decision feedback
where 𝑿 = [𝑿(0), . . . , 𝑿(𝑎), . . . , 𝑿(𝑁 − 1)] and process is applied here. Assuming that the detection process
𝑿(𝑎) = [𝑋1 (𝑎), . . . , 𝑋𝑁𝑇 (𝑎)]. Let us define 𝒀 𝑢 ([𝑛1 , 𝑛2 ]) = starts from 𝑎 = 0, by tracing back 𝑑 previous states on the
[𝑌𝑢 (𝑛1 ), . . . , 𝑌𝑢 (𝑛2 )] where 𝑛1 < 𝑛2 ∈ Z + . By applying the survivor path of the current state, we can retrieve 𝑑 × 𝑁𝑇
probability chain rule, we have symbols corresponding to the sub-carriers 𝑎−𝑑 to 𝑎−1. This is
𝑝(𝒀 𝑢 , 𝑿) = 𝑝(𝑿(𝑁 − 1)) × ⋅ ⋅ ⋅ × 𝑝(𝑿(0)) only half what is needed to approximate the ICI term as shown
in (18). Therefore, we propose a bi-directional procedure in
×𝑝(𝑌𝑢 (𝑁 − 1)∣𝒀 𝑢 ([0, 𝑁 − 2]), 𝑿) × . . .
which the detection process would be able to obtain all the
×𝑝(𝑌𝑢 (0)∣𝑿). (15) symbols corresponding to the sub-carriers 𝑎 − 𝑑 to 𝑎 + 𝑑 via
This is equivalent to equalizing the received signal twice (from a different direction
𝑁 −1
each time). In addition, the M-algorithm [11] is utilized for
∑
ln(𝑝(𝒀 𝑢 , 𝑿)) = ln(𝑝(𝑌𝑢 (𝑎)∣𝒀 𝑢 ([0, 𝑎 − 1], 𝑿)) further reducing the detection complexity. This is achieved by
𝑎=0
preserving only 𝑀 paths with lowest path metrics for each
+ ln(𝑝(𝑿(𝑎))). (16) detection epoch instead of keeping all the paths. The overall
equalization, namely the BDMA, is summarized below.
This means that the metric for the whole sequence is a sum
∙ An equalization process is carried out with M-algorithm
of the metrics at successive symbol times.
and decision feedback; the equalization direction is from
Since the OFDM tones are independent from each other,
𝑎 = 𝑁 − 1 to 𝑎 = 0. The survivor path with length 𝑑
the dependence between 𝑌𝑢 (𝑎) and 𝒀 𝑢 ([0, 𝑎 − 1] is due
at each state is saved for the next detection phase. Note
to the ICI. To simplify the detection process, we use the
that only half the ICI part of 𝑌˜𝑢 (𝑎) can be computed.
approximation 𝑝(𝑌𝑢 (𝑎)∣𝒀 𝑢 ([0, 𝑎 − 1], 𝑿) ≈ 𝑝(𝑌𝑢 (𝑎)∣𝑿). As 𝑛𝑑
∙ A 2 equalization process with the same M-algorithm
the channel response is assumed to be deterministic and the
and decision feedback is carried out on the resultant ICI
ICI distribution is approximately Gaussian, we can assume
mitigated signal. This starts from 𝑎 = 0 to 𝑎 = 𝑁 − 1.
that each element in 𝒀 𝑢 is Gaussian when conditioned on the
The survivor paths obtained from the previous detection
data sequence 𝑿. Hence,
( ) phase allow a full 𝑌˜𝑢 (𝑎) to be calculated, leading to better
1 −∣𝑌𝑢 (𝑎) − 𝑌˜𝑢 (𝑎)∣2 detection accuracy.
𝑝(𝑌𝑢 (𝑎)∣𝑿) = exp , (17)
𝜋𝜂𝐼𝑛 2𝜂𝐼𝑛 The proposed receiver uses approximately 2𝑁𝑅 𝑁𝑇 𝑁 (2𝑁 +
𝑀 𝐴𝑁𝑇 𝑑(𝐿 − 𝐷)) complex multiplications, while the RISIC
where 𝑌˜𝑢 (𝑎) is the mean of 𝑅𝑢 (𝑎) conditioned on 𝑿. As the algorithm [7] uses approximately 2𝑁𝑅 𝑁𝑇 𝑁 (2𝑁 + 𝐴𝑁𝑇 ).
remaining ICI energy comes from a few tones on each side Overall our method is approximately 2.5 times more complex
of the considered subcarrier, ICI can be estimated from these. with the parameters described in Section V. However, we show
Therefore, 𝑌˜𝑢 (𝑎) = 𝑅𝑑,𝑢 (𝑎) + 𝑅𝑖𝑐𝑖1,𝑢 (𝑎) and 𝑅𝑖𝑐𝑖1,𝑢 (𝑎) is that our method provides significantly better BER.
𝑁𝑇 𝐿−1 𝑎+𝑑
( )
∑ ∑ ∑ 𝑋𝑣 (𝑘) −𝑗2𝜋𝑘𝜏𝑙 𝜌𝑘𝜏𝑙 −𝐺 − 1
ℎ𝑢,𝑣,𝑙 𝑒 𝑁 . V. S IMULATION R ESULTS AND D ISCUSSION
𝑣=1 𝑙=𝐷
𝑁 1 − 𝜌𝑘 Our simulations consider un-coded 2 × 2 MIMO-OFDM
𝑘=𝑎−𝑑,𝑘∕=𝑎
(18) system with LTE-OFDM parameters, 𝑁 = 128, 𝑁𝑠 = 76
The sub-branch metric corresponding to the 𝑢𝑡ℎ received (the number of useful sub-carriers), 𝐺 = 9 (standard LTE CP
antenna, denoted as 𝜇𝑢 (𝑎), is given by length) and 4QAM for sub-carrier modulation. The channel
𝜇𝑢 (𝑎) = − ln(𝑝(𝑌𝑢 (𝑎)∣𝑿)) − ln(𝑝(𝑿(𝑎))) (19) path coefficients are assumed to stay static for a duration of
2 4 OFDM symbols and then they vary independently from one
≡ 𝑌𝑢 (𝑎) − 𝑌˜𝑢 (𝑎) − ln(𝑝(𝑿(𝑎))). static period to another. The sub-channel model considered
in our simulations consists of 𝐿 = 6 equivalently spaced
Rayleigh fading paths with exponential power decay profile
and a RMS delay spread of 𝜏𝑟𝑚𝑠 = 𝜏𝐿−1 /2. In all simulations,
the proposed design considers 𝑑 = 3 as it is realized via
simulation that 90% of the ICI energy comes from the sub-
carriers within the interval [𝑎 − 3, 𝑎 + 3].
Figure 3 and 4 show the simulated BER results for max-
imum channel delay of 𝜏𝐿−1 = 30 and 𝜏𝐿−1 = 60, re-
spectively. The notation ‘PM’ indicates the proposed method;
‘Ite’ indicates the number of iterations and ‘M’ indicates the
value of the 𝑀 factor utilized. Here, our proposed scheme is
compared with a standard ML data detector, which operates on
individual sub-carriers, and the RISIC algorithm proposed in
[7]. The ML detector searches for all possible combinations
of symbols transmitted on sub-carriers from different trans-
mit antennas and computes the corresponding MSE for ML
Fig. 4. BER performance of BDMA algorithm, 𝜏𝐿−1 = 60.
detection. The BER results for the ML receiver are obtained
for both scenarios of insufficient CP (‘ISCP’) and sufficient
CP (‘SCP’). In the first case, the CP is kept at 𝐺 = 9 while
it is extended to the maximum delay spread for the latter. to achieve low transmission overhead and propose a high-
It can be seen that at sufficiently high SNRs, the proposed performance BDMA algorithm for trellis-based detection.
method outperforms both ML-ISCP and RISIC. For delay Simulation results indicate that with only 2 iterations, the
spread of 𝜏𝐿−1 = 30, with 2 iterations, the proposed algorithm proposed BDMA can offer a detection performance close to
can achieve the interference-free detection accuracy: Fig. 3 that in the case of sufficient CP condition, which requires
indicates that the ‘PM:Ite2-M2’ and ‘PM:Ite2-M16’ curves 6 times the CP length. Yet, the BDMA complexity can
coincide with the ‘ML-SCP’ curve at high 𝐸𝑏 /𝑁0 . The close be considerably reduced with small degradation in reception
performance between the ‘PM:Ite2-M2’ and ‘PM:Ite2-M16’ accuracy by configuring the 𝑀 parameter.
encourages the use of 𝑀 = 2 for good performance and R EFERENCES
significant complexity reduction. For much larger delay spread
[1] E. Dahlman, S. Parkvall, and J. Skold, “4G LTE/LTE-Advanced for
of 𝜏𝐿−1 = 60, as shown in Fig. 4, the ‘PM:Ite2-M2’ can Mobile Broadband”, Elsevier Ltd., Oxford, 2011.
still approach the ‘ML-SCP’ and is much better than the other [2] L. J. Cimini, “Analysis and Simulation of A Digital Mobile Radio
curves at high 𝐸𝑏 /𝑁0 . The RISIC algorithm performance is Channel Using Orthogonal Frequency Division Multiplexing”, IEEE
Trans. Commun., vol. 33, pp. 665 – 765, Jul. 1985.
significantly worse even with more iterations. [3] M. Shaodan and T. S. Ng, “Semi-Blind Time-Domain Equalization for
MIMO-OFDM Systems”, IEEE Trans. Veh. Tech., vol. 57, pp. 2219 -
2227, Jul. 2008.
[4] G. Leus and M. Moonen, “Per-Tone Equalization for MIMO–OFDM
Systems”, IEEE Trans. Sig. Process., vol. 51, pp. 2965 - 2975, Nov.
2003.
[5] Y. Jin and X. G. Xia, “A Robust Precoder Design Based on Channel
Statistics for MIMO–OFDM Systems with Insufficient Cyclic Prefix”,
IEEE Trans. Commun., vol. 62, pp. 1249 - 1257, Apr. 2014.
[6] C. Y. Lin, J. Y. Wu, and T. S. Lee, “Robust Constrained Optimization
Based Linear Receiver for High-Rate MIMO–OFDM Against Channel
Estimation Errors”, IEEE Trans. Sig. Process., vol. 55, pp. 2628 - 2645,
Jun. 2007.
[7] D. Kim and G. L. Stuber, “Residual ISI Cancellation for OFDM with
Applications to HDTV Broadcasting”, IEEE Jou. Sel. Areas Commun.,
vol.16, pp. 1590 – 1599, Oct. 1998.
[8] J. B. Lim, C. H. Choi, and G. H. Im, “MIMO-OFDM with Insufficient
Cyclic Prefix”, IEEE Commun. Lett., vol. 10, pp. 356 - 358, May 2006.
[9] S. Suyama, Y. Hara, H. Suzuki, Y. Kamio, and K. Fukawa, “A Maximum
Likelihood OFDM Receiver with Smoothed FFT-Window for Large
Multipath Delay Difference over The Guard Interval”, in Proc. IEEE
VTC, vol. 3, pp. 1247-1251, 2002.
[10] T. M. Pham, P. A. Martin, G. Woodward, K. P. Kongara, and C. Horn,
Fig. 3. BER performance of BDMA algorithm, 𝜏𝐿−1 = 30. “Receiver Design for SIMO-OFDM Systems with Insufficient Cyclic
Prefix”, in Proc. IEEE VTC, Sep. 2014.
[11] J. B. Anderson, “Instrumentable Tree Encoding of Information Sources”,
M.Sc. Thesis. School of Elect. Eng., Cornell Uni., 1969.
VI. C ONCLUSION [12] J. G. Proakis, “Digital Communications”, McGraw Hill, Boston, 2001.