• No results found

Forward-Error-Control-Assisted Detection of Uncoded Bits in D-AMPS

N/A
N/A
Protected

Academic year: 2022

Share "Forward-Error-Control-Assisted Detection of Uncoded Bits in D-AMPS"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Forward-Error-Control-Assisted Detection of Uncoded Bits in D-AMPS

Petra Deutgen1, Erode Randers1, Hakan Eriksson2, Karim Jamal3

1 Div. of Signal Processing Lulea University of Technology S-971 87 Lulea, Sweden

3 Nippon Ericsson K.K.

Kioicho Fukudaya Bldg.

6-12, Kioicho Chiyoda-ku Tokyo 102, Japan

Abstract - We present a re-detection scheme for the purpose to decrease the bit-error rate.

The method is based on unequal Forward Error control Coding, FEC, where some data bits are protected by FEC and some are not. With this method, information about the error corrected

data bits is fed back to aid a re-detection of the uncoded data bits.

The method is evaluated for the North American Digital Cellular Mobile Telephone System, D-AMPS. Simulations indicate that a performance gain of up to 3 dB of carrier to interference ratio is achievable on a frequency selective fading channel for a residual bit-error rate of 1%.

1 Introduction

Unequal Forward Error control Coding, FEC, [1] is used by many contemporary communication systems, e.g. Global System for Mobile communication, GSM, Personal Digital Cellular, PDC, and D-AMPS. By using unequal FEC, some bits are protected by more error correcting codes than other bits. This gives the

receiver access to more information about some bits than about others. We present and investigate the

potential ofa scheme that takes advantage ofthis in the detection ofuncoded bits among FEC protected

bits.

The presented scheme utilizes the enhanced information about the coded bits, after decoding, in a re-detection of the uncoded bits. During the re-detection, the coded bits are used as known, thus the re-detection is done under the assumption that there are no bit-errors left among the coded bits after decoding. To utilize the known bits in the re-detection there need to be a known dependence between the received samples. This dependence is present when, e.g. modulation with memory is used and it can occur because of, e.g. memory induced by the channel, resulting in Inter-Symbol Interference, ISI.

We will illustrate the re-detection method by applying it on the D-AMPS system, specified by the standard EIA/TIA IS-136 [2]. In D-AMPS, unequal FEC and differential modulation is used. The mobile communication channel can often be assumed to contain time dispersion which may lead to ISI. This implies that the method could decrease the bit-error rate in the D-AMPS system.

Related work can be found in [3]-[5]. In [3] the transmitted bursts are collected column wise in a de-interleaving matrix with depth equal to the code memory. One row in the matrix is processed by the decoder and the first symbol in this row is decoded. The decision is fed back to the matrix to be used for ISI cancellation in the following row. The method presented in [3], is also discussed in [4]. In [5] decoded data are fed back and used as trainingsequence for channel tracking. In these studies decoded data have been fed back to aid the detection process. However, none of these papers exploits unequal error control

coding.

This paper proceeds as follows: In Section 2 we apply the re-detection scheme to D-AMPS. A simu lation setup is described in Section 3 and the performance ofthe implemented method is demonstrated

in 4. An assessment of the increase in complexity of implementing the method is given in Section 5.

Finally, in Section 6 conclusions are presented.

2 Ericsson Mobile Communication AB S-223 70 Lund, Sweden

2 The Method applied to D-AMPS

The implementation of the re-detection scheme is dependent on the channel coding and interleaving being used. Therefore in Section 2.1 we give a short review ofthe D-AMPS standard [2] concerning these issues. Section 2.2 presents the receiver which is used as a reference receiver and outlines the re-detection of unknown bits among known bits. In Section 2.2.1 three implementations of the re-detection scheme

are presented.

(2)

2.1 Channel Coding and Interleaving in D-AMPS

The D-AMPS (IS-136) standard [2] discriminates among three levels of FEC-induced protection according to significance, see Figure 1. For the less significant bits, here denoted class 2 bits, no protection is

invoked. For the class 1 bits, a convolutional code has been used. Among the class 1 bits, a partition,

here denoted class la bits, have been additionally protected by means of a cyclic redundancy check code,

CRC. All other class 1 bits are referred to as class lb bits.

C[k] = {c][k],c,[k]]

Interleaver

B[k] = {c[[k-l],c2[k]}

12 mot) perceptually agmficut biu

tail bit*

12. Linear

block code

(19.12) ^> Coovolirtional (2.1.5)

178 .

1

I

u

'1 260, >

1

1 clasclcoded \)

bile / 77

class 1 bits I>

82 .

r:l».« 2 hits >

^[k-lL—Tl/c,!

•M

Figure 1: The channel coding (left) and interleaving (right).

In the block diagonal interleaving scheme of D-AMPS, both coded and uncoded bits are written

column-wise into one interleaving matrix, here denoted a coded frame, C[k]. The bits are then transmitted

row-wise in a burst B[k]. Figure 1 shows the burst being assembled, where a[k] and C2[k] corresponds

to the set of even and odd rows of the k'th interleaving matrix, respectively.

2.2 The Receiver Structure, Detection of Unknown Bits Among Known

The receiver which is used as reference, is henceforth denoted the one-pass receiver and is shown in

Figure 2. The detector is an adaptive MLSE with decision feedback channel tracking. The sequence estimation is done with a soft output Viterbi detector. After the detection of the current burst, B[k], de-interleaving is done, creating the coded frame C[k - 1]. The class 1 bits are then decoded, while the

class 2 bits are taken directly from C[k —1].

B[k]

detector

BtkJ Qk-l]

decoder

class 1 bits

A

A

V-J.

F[k-1

C IK-Ij Z C IKj

class 2 bits

Figure 2: The one-pass receiver structure.

In the re-detection scheme the one-pass receiver is used as a building block. The protected bits are used as known bits to restrain the trellis of the Viterbi detector in the re-detection of the unprotected bits. That is, the number of valid transitions between the states in a trellis is reduced.

In D-AMPS differential phase shift keying is used, thus the restraining will be in terms of transition restraining. Any two parallel paths through the trellis are equivalent as they give rise to the same sequence

of phase shifts. At a restraint, only the transitions corresponding to the known phase shift are considered

valid.

2.2.1 Implementations of the Re-detection Scheme

This section presents three receiver structures, called the two-pass, three-pass and composite receiver, respectively, which uses the re-detection scheme, see Figure 3.

The two-pass receiver The primary detection, de-interleaving and decoding are done by the one-pass receiver, resulting in a complete set of class 1 bits contained in the frame F[k - 1], see Figure 2. The

class 1 bits in F[k —1] are re-encoded, giving a corrected coded frame Cc[k —1], and then considered

known, when re-detecting the class 2 bits in the received burst, B[k]. Due to interleaving, only 86 of the

coded class 1 bits of Cc[k —1] are found in B[k], i.e., the coded class 1 bits in c\[k—1]. Consequently, the

re-detection of B[k] is aided by these bits only. The two-pass re-detection of burst B\k) is initiated only

when the CRC check of the class la bits corresponding to F[k —1], in the one-pass receiver, is affirmative.

(3)

T \ n

fa-U

Prepare feedback information B[k] One-pass receiver

{c=[k-110}

i

i i

_i i

fen, n !

Two-pass receiver F[k-1]

'

Sjlk-i]

fen n

-1

z Composite receiver F[k-1]

fyk-1]

!

Bfc-lJ, Three-pass receiver F[k-2]

2],c|[k-l]} j

SrCtV

iC]lK-

Figure 3: Three implementations of the re-detection scheme.

The three-pass receiver To be able to use all class 1 bits when re-detecting the class 2 bits, the three-pass receiver imposes an extra delay ofone burst. The class 1 bits in Cc[k - 1] and Cc[k - 2] found in B[k - 1] are used to re-detect the class 2 bits in B[k - 1], i.e., the class 1 bits in c\[k - 2] taken from Cc[k - 2] and c§[fc - 1] taken from C°[k - 1]. That is, after having received and processed burst B[k], F[k - 2] is produced. The three-pass re-detection ofburst B[k - 1] is initiated only when the CRC check of the class la bits corresponding to F[k - 1], and the CRC check of the class la bits corresponding to

F[k —2] in the one-pass receiver, is affirmative.

The composite receiver The composite receiver selects the bits of F[k - 1] from all three receivers.

The class 1 bits are selected from the one-pass receiver. The class 2 bits are taken from the two-pass and

the three-pass detectors. The class 2 bits from the two-pass detector are found in the set ci[k - 1] and the class 2 bits from the three-pass detector are found in the set c2[fe - 1]. Thus the composite receiver avoids the time delay, and is able to use more protected bits than the two-pass receiver.

3 Simulation Setup

Figure 4 shows the simulated transmission system with transmitter, interferer, channel and receiver.

Transmitter Channe Receiver

TX

Carrier RCH

C+I

*

RX

TX

Interferer RCH '

Rayleigh fader, fd

_^ Rayleigh _ %

fader, fd

Rayleigh fader, fd

_ Rayleigh _ T

fader, fd

Rayleigh fader, fd

_ Rayleigh _ 1 fader, fd L_L

Rayleigh fader, fd

_^ Rayleigh

fader, fd

Figure 4: The simulated transmission system.

Each transmitter block consists of a random data generator and, as described by the D-AMPS stan dard, a channel encoder, an interleaver, a burst generator and a modulator. Co-channel interference is modelled by a single interference transmitter which is symbol-synchronized with the desired signal. The

influence of the co-channel interference upon the received signal is signified by the Carrier to Interference

ratio, C/I.

The simulated channel model with Rayleigh fading and co-channel interference is shown in Figure 4.

The base-band equivalent radio channel is modelled by a two-path FIR model. The paths being mi- correlated and complex Gaussian, with the second-order statistics described by the isotropic scattering

model [6]. This model is characterized by the parameters t, a and fd, where r is the delay interval,

(4)

i.e., the distance between the paths in fractions of the symbol time, Ts. The relative attenuation of the second path is a, and fd is the Doppler spread of the Rayleigh fading in Hz. Receiver antenna diversity is simulated by using two paths with channel correlation p = 0.7. White Gaussian noise is added to each

path, prior to receiver filtering, with a constant signal to noise ratio, Eb/NO, of 35 dB.

Between the transmitter and the receiver the sampling rate is Ta/8. The receiver filter in the simu lations is a fourth order Butterworth filter with cut-off frequency 16.5 kHz followed by a Gaussian filter with BT product 0.2. The other parts of the receiver are implemented as described in section 2.2.1.

4 Simulation Results

The performance of the one-, two- and three-pass receivers, together with the composite receiver was examined considering the bit error rate among 15.000 frames containing 159 data bits each. For C/I values above 14 dB, 20.000 frames were used. The attenuation of the second path, a, is 0 dB.

The Residual Bit-Error Rate, RBER, of the class 2 bits is considered, i.e., the rate of bit-errors in frames having an affirmative CRC check. To achieve comparable statistics, the same amount of successfully received frames for each of the four receiver structures were required.

Figure 5 shows the performance gain in C/I at 1% RBER of the different re-detection schemes, compared to the one-pass receiver. The simulations were carried out using a fast fading channel and different delay intervals, r = [0,T5]. Note, in the figure r is pictured in number of samples, where r = 8 corresponds to one symbol time, Ts.

8 1.5

Time Dispersion (tau)

' Three-pass - Composite -Two-pass -One-pass

Figure 5: Performance Gain in C/I at 1% RBER, delay interval, r, in the range [0,TS], fd = 77 Hz.

Simulations have also been done on both a slow fading channel and a fast fading channel. Results from simulations with flat fading (r = 0) channels and varying C/I are shown in Figure 6. The Frame

C/I (dB)

Figure 6: Class 2 RBER, t = 0; left picture: fd = 7 Hz; right picture: fd = 77 Hz.

Erasure Rate, FER, is measured as the number of erased frames per total number of simulated frames.

(5)

According to Figure 6, the three-pass receiver has a higher performance gain than the two-pass receiver.

At 1% RBER, the composite receiver has a performance gain of about 2 dB compared to the one-pass receiver, but about 1 dB performance loss compared to the three-pass receiver. At very low C/I values, the composite receiver is as good as the three-pass receiver.

5 Assessment of Complexity

About 80% of the computational routines in the one-pass detector is repeated once more in a re-detection.

The increase in complexity due to algorithm-specific computations, e.g. the calculation of feedback information, is estimated to be of little significance. Thus the increase in complexity for the two- and

the three-pass detectors compared to the one-pass detector is about 80% each. The composite detector, including both the two- and three-pass detector has an increase in complexity of about 160% compared to the one-pass detector. A large part of the increase in complexity origins from decision directed channel tracking. In systems where no equalisation is done the increase in complexity is expected to be less of a

problem.

The memory usage will also increase due to the algorithm-specific computations, e.g. an additionally

received burst has to be stored, interleaver memory must be added to contain restraining information between bursts, and memory for detector-specific restraining information must be provided.

6 Conclusions

A scheme for FEC-assisted detection of the uncoded bits of the D-AMPS format has been proposed.

The performance at 1% RBER of the uncoded bits is improved by approximately 2 dB C/I on a fading,

time-dispersive channel.

The complexities of the studied re-detection schemes are relatively high. Compared to a conventional detector, the increase in computational load is about 160% for the composite receiver. This is mainly due to the use of equalizers with decision directed channel tracking. In systems were decision directed channel tracking can be avoided, the complexity is expected to be less of a problem.

7 Acknowledgement

The authors wish to express their gratitude to Paul W. Dent at Ericsson Inc. RTP, North Carolina, who originally came up with the idea of the re-detection scheme.

References

[1] S. Lin and D.J. Costello Jr., "Error Control Coding: Fundamentals and Applications," Englewood Cliffs,

NJ: Prentice Hall, 1983.

[2] EIA/TIA Interim Standard, IS-136 "800 MHz Cellular System, TDMA Radio Interface, Dual-Mode Mobile

Station - Base Station Compatibility Standard, IS-136"

[3] R. Mehlan, H. Meyr, "Combined Equalization/Decoding ofTrellis- Coded Modulation on Frequency Selective Fading Channels," Proc. 5:th Tirrenia Int. Workshop on Digital Communications, pp. 341-352, Elsevier

Science Publishers B.V., 1992.

[4] S. Chennakeshu, R.D. Koilpillai, E. Dahlman, "Enhancing the Spectral Efficiency of the American Digital Cellular System with Coded Modulation," Proc. 44:th IEEE Vehicular Technology Conference, June 8-10,

1994, Stockholm, Sweden, pp. 1001-1005.

[5] R. Sharma, W. D. Grover and W. A. Krzymien, "Forward Error Control (FEC) Assisted Adaptive Equaliza tionfor Digital Cellular Mobile Radio," IEEE Transactions onVehicular Technology, Vol. 42, No. 1, February

1993, pp. 94-102.

[6] R.H Clarke, "A Statistical theory of Mobile Radio Reception," Bell System Technical Journal, 1968, pp.

957-1000.

References

Related documents

3 The main result The basic stabilizability result can now be stated Theorem 1 For a system where A has one real eigenvalue > 0 and where the remaining eigenvalues have negative

The figure looks like a wheel — in the Kivik grave it can be compared with the wheels on the chariot on the seventh slab.. But it can also be very similar to a sign denoting a

The other respondent that said that he did not send videos due to them containing different brands, later gave us an example where he sent a Pepsi commercial video with

46 Konkreta exempel skulle kunna vara främjandeinsatser för affärsänglar/affärsängelnätverk, skapa arenor där aktörer från utbuds- och efterfrågesidan kan mötas eller

För att uppskatta den totala effekten av reformerna måste dock hänsyn tas till såväl samt- liga priseffekter som sammansättningseffekter, till följd av ökad försäljningsandel

For this study fifty Nigerian scam letters have been examined in order to find out whether they can be considered a genre of their own based on the definition of genre provided

When using higher rate of penetration the diamonds are pressed deeper into the rock and the gap height decreases, see figure 36b. With a decreased gap height leads to a small

Industrial Emissions Directive, supplemented by horizontal legislation (e.g., Framework Directives on Waste and Water, Emissions Trading System, etc) and guidance on operating