Master Thesis: Forward Error Control Assisted Detection

  • Uploaded by: Frode Randers
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Master Thesis: Forward Error Control Assisted Detection as PDF for free.

More details

  • Words: 12,241
  • Pages: 41
Forward-Error-Control-Assisted Detection Petra Deutgen and Frode Randers Luleå University of Technology Div. of Signal Processing S-951 87 Luleå Sweden Ericsson Radio Systems AB S-164 80 Stockholm Sweden

1(5)

Abstract In the North American Digital Cellular Mobile Telephone System, DAMPS, described by the standard TIA/EIA IS-54, only a part of the digital speech information is protected against transmission errors by an error correcting code. This thesis considers a scheme that uses coded bits to decrease the bit error rate of both uncoded bits and time-delayed coded bits during detection. The detection scheme has been implemented in a simulation environment for D-AMPS. A performance gain of up to 3 dB of C/I has been experienced for the unprotected speech data on a frequency selective fading channel for a residual bit error rate of 1%. Correcting time-delayed coded bits is not as successful as correcting uncoded bits; coded bits showed only a very small decrease in bit error rate.

2(5)

Acknowledgements The first part of the Master’s thesis, written as a conference contribution, could not have been written without the generous help of Karim Jamal of Ericsson Radio Systems, department of Radio Access and Signal Processing Research and Håkan Eriksson and Per Ödling both of Luleå University of Technology, division of Signal Processing. The opportunity to write such kind a paper gave us great inspiration and joy. We are most grateful to them for their help. We also want to thank our adviser, Johan von Perner of Ericsson Radio Systems, department of Radio Base Station Development, he gave us valuable support, when we were developing the reference simulator. As the new detection scheme was developed, we experienced a large amount of inspiration and help from our adviser Karim Jamal. Therefore we want to thank him once more, for his excellent guidance. It has been a stimulating and pleasant time at Ericsson Radio Systems. We especially want to thank Omar Ryde and Erol Incenacar, both of Ericsson Radio Systems, department of Radio Base Station Development, who have contributed to this. Petra Deutgen and Frode Randers

3(5)

Introduction This Master’s thesis project was performed at Ericsson Radio Systems in Kista, Sweden, as a partial fulfillment of the degree of Master of science in computer science and electrical engineering at Luleå University of Technology. This project is a result of a cooperation between two departments of Ericsson Radio Systems: the department of Radio Access and Signal Processing Research (section of Radio Access Research ERA/ T/UR) and the department of Radio Base Station Development (section of Digital Modem Design AR/RB). The aim of this thesis has been to evaluate the substance of a re-detection scheme herein denoted the multi-pass re-detection scheme, proposed by Paul Dent, of Ericsson-GE Mobile Communications Inc., RTP, NC. In order to measure the performance gain of the above-mentioned method, we have implemented a multi-pass re-detection scheme in the SysSim1 simulation environment. We have been able to simulate the performance of both the original receiver (a product simulator of TRX884, a part of a base station for the D-AMPS system) and the multi-pass receiver, run under actual conditions. Through these simulations, we have been able to study various facets of the performance of the multipass receiver. This thesis comprises four parts, of which part I is intended to be a self-contained conference contribution. The other parts, parts II-IV, describe the multi-pass re-detection scheme and the implementation of it in greater detail. Another possible application of the method than documented in part I is described in part III. Part I is written in the form of a conference paper that presents the results of our work with re-detection of uncoded bits by means of a multipass re-detection scheme. Part II considers the possibility of using the multi-pass re-detection scheme with different schemes of signalling. We concentrate on coherent Quadriphase Shift Keying (QPSK) modulation and Differential Quadriphase Shift Keying (DQPSK) that is used in D-AMPS. Part III investigates the possibility of using error corrected bits to decrease the bit error rate for the time-delayed coded bits. Part IV is a documentation of the parts of the software simulator of the multi-pass re-detection receiver. Part IV will be more informative for readers already familiar with the SysSim simulation environment. An explanation of the implementation of the multi-pass re-detection receiver is given with linkage to source code. The source code itself is, 1. SysSim is a simulation environment developed at Ericsson Radio Systems that allows system simulation.

4(5)

however, not included.

5(5)

Part 1

Forward-Error-Control-Assisted Detection of Uncoded Bits in IS-54 Petra Deutgen and Frode Randers Ericsson Radio Systems AB S-164 80 Stockholm Sweden

Abstract—In the North American Digital Cellular Mobile Telephone System, D-AMPS, described by the standard EIA/TIA IS-54, only a part of the digital speech information is protected against transmission errors by an error correcting code. We evaluate a method, suggested in [1], that uses coded bits interleaved among uncoded bits to decrease the bit error rate among the uncoded bits. In this method information about error-corrected data bits is fed back to aid a subsequent re-detection of the uncoded data bits. Simulations indicate that a decrease in the bit error rate for unprotected speech data bits is achievable. A performance gain of up to 3 dB of C/I has been experienced on a frequency selective fading channel for a residual bit error rate of 1%.

I. INTRODUCTION In this paper, the detection of blocks of binary data in digital cellular telephone systems is investigated. Many contemporary communication systems use unequal Forward Error control Coding (FEC) [2], that is, some bits are protected by more error correcting codes than other bits. This gives the receivers access to more information about some bits than about others. We investigate the potential of a scheme that takes advantage of this. We will focus on applying a re-detection method to the North American D-AMPS system, specified by the standard EIA/TIA IS-54 [3]. In the D-AMPS transmission format, the bursts consist of both coded and uncoded bits, and the coded bits are interspersed among the uncoded. This implies that after having decoded the surrounding coded bits, an enhanced re-detection of the uncoded bits could be possible. Assuming that the protected bits have been decoded correctly, these bits are used as known bits when re-detecting the burst. Due to the memory in the modulation (differential modulation), the re-detection can improve the Bit Error Rate (BER) for the uncoded bits. Memory induced by the channel (ISI) also allows for improvement, as does the use of decision directed channel tracking. Within a burst, the bits from the current frame are mixed with bits from the next frame, due to interleaving. Therefore

Luleå University of Technology Div. of Signal Processing S-971 87 Luleå Sweden

it could also be possible to improve the BER for both the uncoded and coded bits belonging to this next frame [8]. The speech distortion known as “warbling”, sometimes encountered in the VSELP speech decoder of D-AMPS, is mainly due to bit errors among the uncoded bits. A method of improving the BER for uncoded bits, with either a differential detector or with a maximum likelihood sequence estimator (MLSE), has recently been put forward in [1]. With a suitably chosen interleaving pattern, a significant BER reduction is claimed for the uncoded bits.Thus it is expected that such a re-detection scheme would enhance the speech quality noticeably. In this paper we evaluate the scheme suggested in [1] for the transmission format of D-AMPS. Related work can be found in e.g. [4], [5] and [6] where decoded data have been fed back to aid the detection process. However, none of these papers exploits unequal error control coding. This paper proceeds as follows: Section II gives a short description of the channel coder and the interleaver employed in the reference transmission system. Section III presents the one-pass receiver. Section IV outlines the re-detection of uncoded bits with the aid of coded bits. Section V studies an implementation of the re-detection scheme, denoted multipass receiver, with the one-pass receiver, as a building block. Depending on the interleaving, three types of multi-pass receivers are studied, called the two-pass, three-pass and composite receiver, respectively. The simulation setup is described together with the simulated performances of the multi-pass receivers in Sections VI and VII. An assessment of the increase in complexity of implementing the multi-pass receivers is given in Section VIII, and finally, conclusions are presented in Section IX. II. CHANNEL CODING AND INTERLEAVING The IS-54 standard discriminates among three levels of FEC-induced protection, see Figure 1. For the bits with the lowest significance, referred to as class 2 bits, no protection is invoked. For the bits at the next level of significance, class 1 bits, a convolutional code has been used. Among the class 1 bits, the partition corresponding to the perceptually most sig-

1(6)

nificant bits, here denoted class 1a bits, have been additionally protected by means of a cyclic redundancy check code (CRC). All other class 1 bits are referred to as class 1b bits.

~ B[k]

^ B[k] detector

^ C[k-1] deinterleaver

class 1 bits decoder ^ F[k-1]

tail bits

12 most perceptually significant bits

5 7 Convolutional encoder (2,1,5)

77

178 coded class 1 bits

class 1 bits 82 class 2 bits

260

^ c [k] 2

class 2 bits

Figure 3. The one-pass receiver structure

2-slot interleaver

Linear block code (19,12)

voice cipher (optional)

speech coder

12

^ c [k-1] Z-1 2

260

decoder. The sequence estimation is done with a soft output Viterbi detector. After the detection of the current burst, B[k], de-interleaving is done, creating the frame C[k-1]. The class 1 bits are then decoded, while the class 2 bits are taken directly from the de-interleaved frame, C[k-1].

Figure 1. The channel coding and interleaving [2]

IV. DETECTION OF UNKNOWN BITS AMONG KNOWN IN IS-54 In the block-diagonal interleaving scheme of D-AMPS, both coded and uncoded bits of a frame are written columnwise into a bit matrix, able to contain one frame. The bits are then transmitted row-wise in a burst B[k].

C[k-1]

The restraining of the trellis, based upon knowledge of coded bits, is determined by the method of modulation. With differential phase shift keying, as used in D-AMPS, the information lies in the differential phase shifts, so the restraining will be in terms of transition restraining.

C[k] 0

1 2

. . .

To take advantage of the unequal protection of the transmitted bits, the protected bits are, when successfully decoded, used for restraining the trellis of the Viterbi detector (the number of valid transitions between the states in a trellis is reduced) in a subsequent re-detection of the unprotected bits.

3

. . .

. . .

. . .

Q B[k]

π/2 ~ (-1,1)

...

10 bits c 1[k-1]

c 2[k]

c 1[k-1]

c 2[k]

c 1[k-1]

(-1,-1) ~ 0

Figure 2. The interleaving

I

Figure 2 shows B[k] being assembled. The bits are selected row-wise, alternatingly, from the matrix containing the current frame, C[k], and the matrix containing the previous frame, C[k-1]. Thus, the interleaving depth is one frame. In terms of C[k] and B[k], the interleaving can be described as

(1,-1) ~ 3π/2

C [ k ] = {c 1 [ k ] , c 2 [ k ] }

π ~ (1,1)

Figure 4. A differential symbol representing two bits

B [ k ] = {c 1 [ k − 1 ] , c 2 [ k ] }

Specifically, a set of data bits is associated with a specific phase shift, see Figure 4, or equivalently a transition in the trellis of the Viterbi algorithm. Any two parallel paths through the trellis are equivalent as they give rise to the same sequence of phase shifts. If the detector has knowledge of some or all of the corresponding bits prior to detecting a differential symbol, the trellis may be restrained, thus reducing the number of valid transitions.

where c 1 [ k ] and c 2 [ k ] correspond to the set of even and odd rows of the interleaving matrix, respectively. III. THE ONE-PASS RECEIVER Figure 3 shows the one-pass receiver scheme used in this work. The detector is an adaptive MLSE with decision feedback channel tracking and with a subsequent differential

2(6)

Q

Q

I

(x,y)

Q

I

(-1,y)

ite receiver, which is a combination of the two- and three-pass receivers, avoids the time delay, but is able to use more protected bits than the two-pass receiver, see Figure 6.

Q

I

(1,1)

A. The two-pass receiver

I

To extract information about the protected bits, a primary detection, de-interleaving and decoding are done by the onepass receiver, resulting in a complete set of class 1 bits as contained in the frame Fˆ [ k − 1 ] . Given that the CRC check for the class 1a bits in Fˆ [ k − 1 ] is affirmative, all of the coded class 1 bits of Cˆ [ k − 1 ] , resulting from re-encoding Fˆ [ k − 1 ] , are considered known1. Applying the two-pass redetection scheme, we initiate a re-detection of the class 2 bits in the received burst B˜ [ k ] by means of the two-pass receiver, similar to the one-pass receiver. Due to interleaving, only the ˆ [ k − 1 ] found in fraction of the coded class 1 bits of C ˜B [ k ] are known. Consequently, the re-detection of B˜ [ k ] is only based on these bits. The re-detection is done by restraining the trellis at the location of these known bits in the Viterbi Algorithm (VA) of the two-pass detector. The two-pass redetection of burst B˜ [ k ] is initiated only when the CRC check ˆ [ k − 1 ] , in the oneof the class 1a bits corresponding to F pass receiver, is affirmative.

(x,1)

Figure 5. The restraining of the trellis

Figure 5 shows different examples of transitions when a symbol represents two bits; Both bits are unknown, the first bit is known, both bits are known, the last bit is known. V. THE MULTI-PASS RECEIVER This section presents a receiver structure, denoted the multi-pass receiver, that uses FEC-assisted re-detection.

B. The three-pass receiver ~ B[k]

One-pass receiver

Two-pass receiver

^ F[k-1]

To be able to use all class 1 bits when re-detecting the class 2 bits, the three-pass receiver imposes an extra delay of one burst. The class 1 bits in Cˆ [ k − 1 ] and Cˆ [ k − 2 ] found in B˜ [ k − 1 ] are used to re-detect the class 2 bits in B˜ [ k − 1 ] . That is, after having received and processed burst B˜ [ k ] , Fˆ [ k − 2 ] is output. The restraining method is analogous to that used in the two-pass detector. In the three-pass case, when re-detecting burst B˜ [ k − 1 ] , there are demands on an affirmative CRC check for the class 1a bits corresponding to Fˆ [ k − 1 ] as well as for the class 1a bits corresponding to Fˆ [ k − 2 ] .

Prepare feedback information

^ F[k-1]

^ c1[k-1] -1

Z

Combiner

^ F[k-1]

C. The composite receiver

^ c2[k-1] ~ B[k-1]

Three-pass receiver

The composite receiver selects the bits of Fˆ [ k − 1 ] from different detectors. The class 1 bits are selected from the onepass receiver. The class 2 bits are taken from the two-pass and the three-pass detectors. The class 2 bits from the two-pass detector are found in the set cˆ 1 [ k − 1 ] and the class 2 bits from the three-pass detector are found in the set cˆ 2 [ k − 1 ], resulting in no inherent extra delay for the composite receiver. This receiver was originally suggested in [1].

^ F[k-2]

Figure 6. The multi-pass scheme

Three types of multi-pass receivers will be studied, called the two-pass, three-pass and composite receiver, respectively. Due to the interleaving, the two-pass receiver uses some, but not all, of the coded bits as known in the re-detection. In the three-pass receiver all coded bits are considered as known when re-detecting the uncoded bits, at the cost of adding a time delay of one burst in the decoding process. The compos-

VI. SIMULATION SETUP Figure 7 shows the simulated transmission system with transmitter, interferer, channel and receiver. The receiver uses 1. A study using only coded class 1a bits in the restraining is found in a related paper [8].

3(6)

Transmitter

Channel

TX (Carrier)

in Hz. Receiver antenna diversity is simulated by using two paths with channel correlation ρ=0.7. White Gaussian noise is added to each path, prior to receiver filtering, with a constant signal to noise ration (Eb/N0) of 35 dB.

Receiver

RCH C+I

TX (Interferer)

C. The Receiver

RX

Between the transmitter and receiver in Figure 7, the sampling rate is TS/8. The receiver filters in the simulations are base band models of actual filters. The other parts of the receiver are described in section V.

RCH

Figure 7. The simulation transmission system

VII. SIMULATION RESULTS

antenna diversity as is indicated in the figure.

The simulations were done to compare the performance of the multi-pass receivers with the one-pass receiver. The performance of the one-, two- and three-pass receivers, together with the composite receiver was examined considering the bit error rate among 15.000 frames containing 159 data bits each. For C/I values above 14 dB, 20.000 frames were used.

A. The Transmitter Each transmitter block consists of a random data generator and, as described by the standard IS-54, a channel encoder, an interleaver, a burst generator and a modulator. Co-channel interference is modelled by a single interference transmitter which is symbol-synchronized with the desired signal. The influence of the co-channel interference upon the received signal is signified by the carrier to interference ratio, C/I.

Only the Residual Bit Error Rate (RBER) of the class 2 bits is considered, i.e. the rate of bit errors in frames having an affirmative CRC check. To achieve comparable statistics, we required the same amount of successfully received frames for each of the four receiver structures. Thus the RBER in the three-pass detector will actually be taken from the burst detected by the one-pass detector if the CRC check of frame C[k-1] is negative and the CRC check of frame C[k-2] is affirmative.

B. The Channel

Rayleigh fader, f d

Transmitter

A Rayleigh fader, f d

τ

α ρ

Rayleigh fader, f d Rayleigh fader, f d

Time dispersion of up to one symbol time has been simulated. The attenuation of the second path, α, is 0 dB unless otherwise stated. The simulations have been done on both a slow fading channel (fd = 7 Hz) and a fast fading channel (fd = 77 Hz), corresponding to vehicle speeds of 10 and 110 km/ h, respectively, at a carrier frequency of 800 MHz.

"C/I"

(1−ρ 2) τ

α

τ

α

Interferer

Rayleigh fader, f d Rayleigh fader, f d

ρ

Rayleigh fader, f d Rayleigh fader, f d

A. Analysis of class 2 bit performance

(1−ρ 2) τ

"C/I"

Figure 9 shows the performance gain in C/I at 1% RBER of the different receivers, compared to the one-pass receiver, simulated on a fast fading channel for different time dispersions, up to one symbol time (here, time dispersion divided with the sample rate, 8 samples/symbol). According to the simulation results shown in Figure 9, the class 2 bit performances of the multi-pass receivers are more or less independent of the degree of time dispersion.

B

α

Figure 8. The simulated channel

Figure 8 shows the simulated channel model, with Rayleigh fading and co-channel interference. The base band equivalent radio channel is modelled by a two-path FIR model. The paths being uncorrelated and complex Gaussian, with the second-order statistics described by the isotropic scattering model [7]. This model is characterized by the parameters (τ,α,fd), where τ is the delay interval, i.e. the distance between the paths in fractions of the symbol time, TS, see Figure 8. The relative attenuation of the second path is α, and fd is the Doppler spread of the Rayleigh fading

4(6)

3.5

0

10

x FER

3

One−pass −1

Two−pass

10

2.5

Three−pass −2

10 1.5

RBER

Performance gain (dB)

Composite 2

Three−pass

1

−3

10

Composite Two−pass

0.5

One−pass −4

10

0

−0.5 0

1

2

3 4 5 Time dispersion (tau)

6

7

8

−5

10

Figure 9. Performance Gain in C/I at 1% RBER, for time dispersion in the range [0,TS], fd=77 Hz

12 C/I (dB)

14

16

18

20

The computational complexities of the multi-pass receivers are higher than the complexity of the one-pass receiver (due to the re-detection). About 75% of the computations in the detector, such as the decision directed channel tracking, have to be performed separately for each detector. This adds substantially to the increase in complexity. However, because of the restraining, not all transition metrics of the Viterbi algorithm need to be computed. This will limit the increase in complexity. The fact that the synchronization has to be done only once for all detectors will also limit the complexity.

x FER One−pass Two−pass Composite Three−pass −2

RBER

10

The increase in computational complexity for the two- and three-pass detectors is about 80%. The composite detector (including all three detectors) has an increase in complexity of about 160% compared to the one-pass detector.

−3

10

−4

10

Furthermore, algorithm-specific computations, e.g. the calculation of feedback data, will contribute to an additional increase in complexity that is difficult to estimate, but we assess this as small.

−5

4

10

VIII. ASSESSMENT OF THE COMPLEXITY

0

10

8

composite receiver is as good as the three-pass receiver.

10

−1

6

Figure 11. Class 2 RBER; fd=77 Hz, τ=0

Performance simulations with fading channels without time dispersion and varying C/I are shown in Figures 10 and 11.

10

4

6

8

10

12 C/I (dB)

14

16

18

20

Figure 10. Class 2 RBER; fd=7 Hz, τ=0

Memory usage is also a consideration. An additionally received burst has to be stored; interleaver memory must be added to contain restraining information between bursts; memory for detector-specific restraining information must be provided, etc.

The Frame Erasure Rate (FER) is measured as the number of erased frames per total number of simulated frames. In the simulations, the performance gain of the re-detection scheme tends to increase with the Doppler spread. The figures shows that the three-pass receiver has a higher performance gain than the two-pass receiver. At 1% RBER, the composite receiver has a performance gain of about 2 dB compared to the one-pass receiver but about 1 dB performance loss compared to the three-pass receiver. At very low C/I values, the

The main reason for the high complexity of the multi-pass receiver is that decision-directed channel-tracking is used in each detectors. If this can be avoided, e.g. by channel interpolation, complexity will decrease substantially. In systems where the channel can be considered stationary, e.g. the

5(6)

Radio,” IEEE Transactions on Vehicular Technology, Vol. 42, No. 1, February 1993, pp. 94-102.

GSM, or systems where differential detection may be used, e.g. the PDC, the complexity is expected to be less of a problem.

[7] R.H Clarke, “A Statistical theory of Mobile Radio Reception,” Bell System Technical Journal, 1968, pp. 957-1000.

IX. CONCLUSIONS

[8] P. Deutgen & F. Randers, “Forward-Error-Control-Assisted Detection,” Master’s Thesis 1994:149E, Luleå University of Technology, Div. of Signal Processing, 1994.

A scheme for FEC-assisted detection of the uncoded bits of the D-AMPS format has been investigated. The performance at 1% RBER of the uncoded bits is improved by approximately 2 dB C/I on a fading, time-dispersive channel. The performance gain is more or less independent of the amount of time dispersion1. Other simulations indicates that the effectiveness of the FEC-assisted detection of the uncoded bits is dependent on the interleaving employed. The improvement is assessed to have a noticeable impact on the speech quality of the system, since the speech distortion problem known as “warbling” is largely an effect of bit errors among unprotected bits. The complexities of the studied multi-pass detectors are relatively high. Compared to a conventional detector, the increase in computational load is about 160%. This is mainly due to the use of equalizers with decision directed channel tracking. For systems where this is not required, e.g. the GSM (Global System for Mobile Communication) or the PDC (Personal Digital Cellular) systems, the total complexity is expected to be significantly smaller. ACKNOWLEDGEMENT We wish to express our gratitude towards Mr. Karim Jamal of Ericsson Radio Systems AB for his significant contributions to the present work. REFERENCES [1] P. Dent, “Invention Disclosure for Decodulation,” Internal Document Ericsson-General Electric, RTP/EGE/CT/Y 93:0009, May 1993. [2] S. Lin and D.J. Costello Jr., “Error Control Coding: Fundamentals and Applications,” Englewood Cliffs, NJ: Prentice Hall, 1983. [3] EIA/TIA Interim Standard IS-54-B, “Cellular System Dual-Mode Mobile Station - Base Station Compatibility Standard,” Electronic Industries Association, 1992. [4] R. Mehlan, H. Meyr, “Combined Equalization/Decoding of TrellisCoded Modulation on Frequency Selective Fading Channels,” Proc. 5:th Tirrenia Int. Workshop on Digital Communications, pp. 341-352, Elsevier Science Publishers B.V., 1992. [5] S. Chennakeshu, R.D. Koilpillai, E. Dahlman, “Enhancing the Spectral Efficiency of the American Digital Cellular System with Coded Modulation,” Proc. 44:th IEEE Vehicular Technology Conference, June 8-10, 1994, Stockholm, Sweden, pp. 1001-1005. [6] R. Sharma, W. D. Grover and W. A. Krzymien, “Forward Error Control (FEC) Assisted Adaptive Equalization for Digital Cellular Mobile

1. Simulation not reported here shows that the effectiveness of the FEC-assisted detection of the uncoded bits depends on the interleaving employed.

6(6)

Part 2

Detection of Unknown Bits Among Known Bits. Petra Deutgen and Frode Randers Ericsson Radio Systems AB S-164 80 Stockholm Sweden

I. INTRODUCTION The knowledge gained by a prior detection and decoding of protected bits can be used in different ways depending on the modulation employed. This paper is a continuation of part 1 and will briefly discuss different methods of doing FECassisted re-detection based upon different types of modulation, detection and symbol constellations. Re-detection issues for the two modulation forms Quadriphase shift keying (QPSK) and Differential QPSK (DQPSK) is discussed in the following section. QPSK modulation produces 4 possible symbols to be transmitted. These symbols represent 2 bits. One or a both of these bits could be considered as known during re-detection. Thus we distinguish between two cases of symbol constellations containing known bits: • •

A fully known symbol, where both bits of the symbol are known. A partially known symbol, where one bit of the symbol is known.

Luleå University of Technology Div. of Signal Processing S-971 87 Luleå Sweden

symbols. The channel has no memory, therefore a memoryless detector is used in this section. In Subsection A re-detection of the QPSK modulated fully known symbols is discussed and in Subsection B re-detection of partially known symbols is discussed. A. Fully known symbols All known bits are grouped into fully known symbols, and consequently all unknown bits make up the surrounding unknown symbols. Since there is no coupling between known and unknown bits, the only gain possible is an enhanced channel (phase) estimation for the surrounding unknown symbols. B. Partially known symbols Due to the Gray coding normally used, there will be no decrease in bit error probability, for the unknown bits, see Figure 1.

Besides the two different modulation forms and the two symbol constellations this paper also considers two channel cases, with Intersymbol Interference (ISI) and without ISI. In the former case a maximum likelihood sequence estimator (MLSE) is used, and in the latter case a memoryless threshold detector is used. The results are presented in a table, consisting of the following sections: • • • •

M=4 (-1,1)

No estimations of possible gains are made in the following sections. Only the question if there will be a gain or not in the detection, using a specific method, is considered. QPSK MODULATION AND CHANNEL WITH NO ISI

Q (-1,-1)

I (1,1)

QPSK modulation and channel with no ISI QPSK modulation and channel with ISI DQPSK modulation and channel with no ISI DQPSK modulation and channel with ISI II. POSSIBILITES FOR PERFORMANCE GAINS

Q

(1,-1)

a) Symbol unknown

I (1,1)

(1,-1)

b) Symol partially known; first bit known to be 1

Figure 1. The restraining of signal points

The QPSK modulated symbol is equivalent to two independent BPSK symbols each representing one bit and the decision boundary does not change for one of the bits when knowing the other. The only gain possible is an enhanced channel (phase) estimation for the surrounding unknown symbols, as in Subsection A.

This system exhibits no kind of dependencies between the

1(3)

due to the differential modulation. The channel has no memory and therefore a detector without equalizer is used in this section. In this section the re-detection method of the QPSKmodulated fully known symbols is described.

QPSK MODULATION AND CHANNEL WITH ISI

This system exhibits dependencies between the symbols. The channel has memory and therefore an equalizer is used in this section. In Subsection A, re-detection of the QPSK modulated fully known symbols is discussed and in Subsection B re-detection of partially known symbols is discussed.

A. Fully known symbols The re-detection method applied to this form of detection will consist of knowing (any number of) phase changes up to some point and thereafter use an enhanced initial vector for detecting the following unknown symbol. Based upon a known phase shift Θ1, i.e. the angle between vector z[k-1] and vector z[k], a better estimate of the starting vector for the subsequent unknown phase-shift Θ2 is feasible [1]. Figure 4

A. Fully known symbols The detection of the unknown symbols will benefit from the surrounding known symbols due to the ISI. The trellis of a Viterbi algorithm is forced to go through a single state at each known symbol, see Figure 2. Thus a gain is possible due to better ISI-estimation and better channel-tracking because of more reliable decisions.

M=4

M=4

Unknown symbol

Fully known symbol

Θ 1 = π/2 Q

Unknown symbol

(Known phase shift) z[k-1]

Θ1 I

~

Θ2 z[k] z[k+1]

Figure 2. A fully known coherent symbol Figure 4. Differential detection

B. Partially known symbols. The trellis is forced to go through 2 states at the locations of partially known symbols, see Figure 3.

M=4

Unknown symbol

Partially known symbol

shows three incoming coherent symbols z[k-1], z[k] and z[k+1]. After detection, the output will be two differential symbols representing the phase-shifts between z[k-1] and z[k], and z[k] and z[k+1], respectively. In this case the first symbol, representing the phase-shift Θ1, is known. The second symbol represents the phase-shift Θ2. Due to the known phase-shift, z[k] could be enhanced, which is explained in Figure 5. With an enhanced start-symbol z[k], a better estimate of the symbol representing the phase-shift Θ2 could be gained. Figure 5 shows the enhancement of the start-vector when the phase shift is known to be π. In Figure 5, z[k-1] and z[k] are the incoming coherent symbols when x[k-1] and x[k] are transmitted. The phase-shift between z[k-1] and z[k] is known as π. Since the phase-shift is known to be π, z[k-1] shifted π could be used instead of z[k], but this shifted symbol would have equal statistics as z[k-1]. An enhanced symbol is obtained by taking the average of the two symbols, the shifted z[k-1] and z[k], as shown in Figure 5. Also, known symbols following an unknown symbol may be used (in reverse) to enhance the final vector of the unknown phase change (z[k+1] in Figure 4). If infinitely many preceding phase-shifts to an unknown phase-shift are known the coherent start-symbol of

Unknown symbol

Figure 3. A partially known coherent symbol

There is a re-detection gain of the unknown bits in the partially known symbol because of better ISI-estimation and better channel-tracking, but there is no re-detection gain attained by the decreased number of possible symbol-choices. DQPSK MODULATION AND CHANNEL WITH NO ISI

This system exhibits dependences between the symbols,

2(3)

three symbols, first symbol and last symbol are unknown while the second symbol is fully known. One effect of this kind of restraining is that the trellis is forced apart at the location of a fully known symbol. As in the case of coherent modulation there is a performance gain possible due to better ISI estimation and better channel-tracking. A performance gain because of noise averaging is also made possible, due to the differential modulation.

z[k]=x[k]+n 2

M=4

Q

n

Fully known phase shift

1

z[k-1] Enhanced vector z[k] Shifted z[k-1]

n

B. Partially known symbols

I

There are 2 transitions out of each state, see Figure 7, leading to two possible transitions at the location of the partially known symbol. A case dealing with both fully known symbols and partially known symbols is studied and simulated in [2].

2

(n 1 + n 2) / 2

Figure 5. Symbol enhancement

this unknown phase-shift would be correct. In this case the differential detection would have the same performance as a coherent detector. The maximum increase is thus less than 3 dB. If an unknown symbol is surrounded by infinitely many known symbols, the performance increase has no limit.

M=4

Unknown symbol

Partially known symbol

Q

DQPSK MODULATION AND CHANNEL WITH ISI

Q

I

Unknown symbol Q

I

I

This system exhibits dependences between the symbols, due to the differential modulation and memory in the channel, therefore an equalizer is used in this section. In Subsection A the re-detection method of the DQPSK modulated fully known symbols is described and in Subsection B re-detection of partially known symbols is described. A. Fully known symbols Figure 7. A partially known differential symbol

M=4

Unknown symbol

Fully known symbol

Q

Q

I

Unknown symbol

III. SUMMARY To achieve any performance gain by re-detection of unprotected protected and unprotected bits must be sufficiently mixed and there has to be a memory of some kind in-between received bits. This memory can be inherent in the modulation, e.g. in differentially encoded modulation, or it may be due to the channel introducing ISI. It may also be a result of how the detector works; if the detector uses adaptive channel tracking the unprotected bits could be re-detected with a better channel estimate, due to more known pilot symbols.

Q

I

I

IV. REFERENCES [1] P. Dent, “Invention Disclosure for Decodulation,” Internal Document Ericsson-General Electric, RTP/EGE/CT/Y 93:0009, May 1993. [2] P. Deutgen & F. Randers, “Forward-Error-Control-Assisted Detection,” Master’s Thesis 1994:149E, Luleå University of Technology, Div. of Signal Processing, 1994.

Figure 6. A fully known differential symbol

Instead of restraining the trellis to a single state, a single transition is allowed out of each state, see Figure 6 showing

3(3)

Part 3

Re-Detection of Coded Bits for IS-54 Petra Deutgen and Frode Randers Ericsson Radio Systems AB S-164 80 Stockholm Sweden

This paper is written as to develop some of the ideas that came up in part 1 and is meant to be a complement. In contrast to [1], this paper will treat the performance of the multipass re-detection scheme for re-detecting coded bits. Due to the interleaving [2], the unknown class 1 bits transmitted in the current burst, belonging to the current frame, can be helped by the error corrected class 1 bits transmitted in the same burst, but belonging to the previous frame. In Section II the performance of the two-pass receiver is analyzed, using the fading channel in [1]. In Section III further studies on the re-detection scheme, using an AWGN channel, are done. Three probable effects on the performance of the re-detection of the coded bits will be discussed: 1) How the use of information, on incorrectly received bits, in the re-detection affects performance of the multi-pass receiver. 2) How the adaptive channel tracking influences the redetection. 3) How the soft information provided to the channel decoder during detection influences the multi-pass receiver. II. SIMULATIONS ON A FADING CHANNEL WITH CO-CHANNEL INTERFERENCE The simulations are done in order to compare the performance of the multi-pass receivers with the one-pass receiver. The performance of the one-, two- and three-pass receivers, together with the composite receiver is examined considering the bit error rate among 15.000 frames containing 159 data bits each. For C/I values above 14 dB, 20.000 frames were used in the simulations. Time dispersion of up to one symbol time has been simulated. The attenuation of the second path, α, is 0 dB. The simulations have been done on a fast fading channel (fd = 77 Hz) [1]. Figure 1 shows the performance gain in C/I at 1% RBER of the class 1 bits, of the different receivers, in comparison with the performance of the one-pass receiver, simulated on a fast fading channel for different time dispersions [1]. The simulation results indicate that the performance of the multi-pass

receivers considering re-detection of class 1 bits, is worse than of the one-pass receiver and more or less independent of the degree of time dispersion.

0.5 Three−pass Two−pass One−pass

Performance gain (dB)

I. INTRODUCTION

Luleå University of Technology Div. of Signal Processing S-971 87 Luleå Sweden

0

−0.5

−1 0

1

2

3

4 5 Time dispersion

6

7

8

Figure 1. Class 1 performance gain in C/I at 1% RBER, for time dispersion in the range [0,Ts], fd=77 Hz

A. Analysis of class 1 bit performance for the three-pass receiver. Figure 2 shows the RBER [1] for the class 1 bits experienced with the one- and three-pass receiver respectively. According to the simulation results, the three-pass receiver exhibits no improvement in class 1 bit performance compared to the one-pass receiver. This confirms the theory that since all class 1 bits are considered known (and correct) and the three-pass receiver in consequence is forced to detect the class 1 bits in compliance with this information, no improvement will occur. According to the simulations the three-pass receiver is slightly worse than the one-pass receiver for low C/I values. This may have an explanation in that for low C/I values, an entire new (valid) CRC code word can be formed resulting in an affirmative CRC check from the one-pass receiver, although bit errors are found among the class 1a bits.

1(4)

could decrease the performance gain of the re-detection scheme when utilized to restrain the trellis. The effect of using incorrect bits in the pruning of the trellis is analyzed in Subsection A. 2) The influence of the channel tracking on the performance of the re-detection scheme is discussed in Subsection B. 3) Differences in performance of the multi-pass scheme when supplying soft information to the decoder versus supplying hard information is discussed in Subsection C.

0

10

x FER One−pass

−1

10

Three−pass

−2

RBER

10

−3

10

A. Simulations with all class 1 bits used in the restraining compared with simulations with only class 1a bits used in the restraining. Incorrectly received bits will introduce error-propagation when they are used to prune the trellis in the re-detection. Simulations are performed with two different definitions of which bits may be considered known:

−4

10

−5

10

4

6

8

10

12 C/I (dB)

14

16

18

20

Figure 2. Class 1 RBER, fd=77 Hz, τ=0

1) All class 1 bits are considered as encompassed in the CRC check and thus known in a subsequent re-detection.

B. Analysis of class 1 bit performance for the two-pass receiver.

2) Only coded class 1a bits are considered known in a subsequent re-detection. This demands a strict classification of coded class 1a bits. The classification of coded class 1a bits is necessary since all class 1 bits are convolutionally encoded and a coded bit may have been computed based upon information on both class 1a bits and class 1b bits. The strict classification regards the constraint length of the encoder and refers to the coded class 1 bits which have been computed only based upon information on class 1a bits, parity bits produced by the block coder and tail bits (known bits) [2].

Figure 3 shows the RBER experienced with the one- and two-pass receivers [1]. The two-pass receiver has a performance loss compared to the one-pass receiver.

0

10

x FER One−pass

−1

10

Two−pass

−2

10 RBER

Simulations are done to compare the one-pass and the twopass receivers. In these simulations the one-pass and the twopass detectors provide soft information to the channel decoders. Figure 4 shows the performance of the two-pass receiver when using all class1 bits and when using only class 1a bits, respectively, together with the performance of the one-pass receiver. It is shown in the figure that the performance of the two-pass receiver is better when using only class 1a bits in the re-detection. However, the one-pass receiver is still better than the two-pass receiver using only the class 1a bits. Other simulations, not documented in this report, shows that for C/I values higher than 1 dB all class 1a bits, which are used as known in the re-detection, are correct. Therefore the decrease in performance during re-detection, using these bits only, is probably not due to error propagation in the re-detection.

−3

10

−4

10

−5

10

4

6

8

10

12 C/I (dB)

14

16

18

20

Figure 3. Class 1 RBER, fd=77 Hz, τ=0

III. SIMULATION OF THE MULTI PASS SCHEME ON AN ADDITIVE WHITE GAUSSIAN NOISE (AWGN) CHANNEL The simulation results considered in this chapter are provided using an AWGN channel with no time dispersion and several signal to noise ratios (Eb/No). Three probable causes to a decrease in performance for re-detection of class 1 bits are analyzed: 1) Only the class 1a bits are encompassed by the CRC check. This implies that incorrectly received class 1b bits

2(4)

1

1 One-pass Two-pass, class 1a+1b Two-pass, class 1a

Two-pass, soft dec., class 1a, no est Two-pass, soft dec., class 1a, est

0.1

RBER

RBER

0.1

0.01

0.001

0.01

0.001

0.0001

0.0001 0

1

2

3

4

5

6

0

SNR (dB)

1

2

3

4

5

6

SNR (dB)

Figure 5. Class 1 RBER, AWGN, soft decision, [channeltracking, no channel-tracking] used

Figure 4. Class 1 RBER, AWGN, soft decision, [all class1, class 1a] used

B. Simulations with and without channel tracking

C. Simulations with hard and soft information to decoder

In the two- and three-pass detectors, the paths in the trellis are forced to follow predestinated transitions at locations corresponding to known class 1 bits. Because the detection is coherent with a subsequent differential decoding, at least one transition out from each state will always be allowed (corresponding to a location with a fully known phase shift) [1]. Due to this, the quick merge of nodes in the two- and threepass detectors is prevented where the trellises are pruned. Instead, the paths are forced apart. This side-effect, when pruning the trellis, might affect the channel tracking, when the channel-tracking is done according to the coherent states in the trellis. Figure 5 shows simulations done with channel tracking and without channel tracking, using the AWGN channel with the same conditions as in section C where all class1 bits are considered as known during the re-detection. According to the simulations the channel tracking has no negative effect on the performance of the two-pass re-detection of the coded bits. Though the side-effect, that the trellis are forced apart, when pruning the trellis, might still be a cause to the bad performance for the re-detection scheme in some other sense than that the channeltracking is not negatively affected.

The detectors used in the simulations can produce either soft or hard information to the decoder. The soft information provided by the detector depends on the certainty of the decisions during detection [3]. In the re-detection scheme, locations in the trellis, corresponding to known bits and also surrounding locations, will produce re-detected bits with a soft value implying higher certainty than the corresponding bits have got during the one-pass detection. Thus the decoder could get erroneously detected bits with soft values indicating high certainty. The utilization of soft information in this case may decrease the performance gain of the decoder compared to when hard information is used, instead of increasing it. Therefore, differences in performance of the re-detection scheme when using soft information versus hard information is analyzed. Simulations are done to compare the performance of the two-pass receiver passing soft information versus hard information to the decoder. Figure 6 shows the performance of the two-pass receiver when using soft information, all class 1 bits used as known or just the class 1a bits used as known and hard information with the same classification of known bits. The simulations show that for increasing C/I values, the gain increases for the two-pass receiver using hard decisions, i.e. the performance is better than the performance of the twopass receiver using soft information. It seams likely that the current soft decision algorithm is incompatible with this redetection scheme. The comparisons between the performance gain of the twoand one-pass receiver both using hard information and only

3(4)

on class 1a bits only in the re-detection scheme is preferred before using all class 1 bits. The way the pruning of the trellis is done is not affecting the channel tracking negatively, but might affect the performance of the multi-pass receiver in some other extent. Comparison of the performance of the one- and two-pass receiver, using hard decision and only the bits protected by the CRC, indicates that re-detection can be used to increase the performance of the class 1 bit detection. The performance gain is negligeable though. The performance for different types of interleaving has not been simulated since the interleaving is stipulated by the standard IS-54. The performance can probably be increased further by using a more suited scheme of interleaving.

the class 1a bits as known, is shown in Figure 7. According to the simulations, the gain increases when multi-pass re-detection is used, even though the increase is almost zero.

1 Soft Soft Hard Hard

decision, decision, decision, decision,

class class class class

1a+1b 1a 1a+1b 1a

0.1

RBER

0.01

REFERENCES 0.001

[1] P. Deutgen & F. Randers, “Forward-Error-Control-Assisted Detection,” Master’s Thesis 1994:149E, Luleå University of Technology, Div. of Signal Processing, 1994. 0.0001

[2] EIA/TIA Interim Standard IS-54-B, “Cellular System Dual-Mode Mobile Station - Base Station Compatibility Standard,” Electronic Industries Association, 1992 1e-05 0

1

2

3

4

5

[3] G. Bottomley, “Soft information in ADC,” Internal Report RTP/EGE/ CT/Y 93:0024, Ericsson-General Electric, July 1993.

6

SNR (dB)

Figure 6. Class 1 RBER, AWGN, [hard, soft decision], [all class 1, class 1a] bits used

1 One-pass, hard decision Two-pass, hard decision, class 1a

0.1

RBER

0.01

0.001

0.0001

1e-05 0

1

2

3

4

5

6

SNR (dB)

Figure 7. Class 1 RBER, AWGN, hard decision, class 1a bits used

IV. CONCLUSIONS The soft decision algorithm employed today [3] should be modified if a re-detection of the class 1 bits should be useful. For low to moderate C/I values, the utilization of information

4(4)

Part 4

A Functional Description of the Multi-pass Equalizer This document is a description of the implementation of the multi-pass equalizer as proposed by Paul Dent [1]. The program is based on the REQU, the reference equalizer developed by T/UR, modified in order to run together with other components of the TRX884 DVC simulator. Therefore we will describe the REQU core as well.

1(19)

Contents 1 The REQU core 1.1 The module Compute R&Phi . 1.2 The module Process R&Phi . 1.3 The module Synchronize . . 1.4 The module Demod . . . .

. . . .

2 The Multi-pass Equalizer Scheme 2.1 The one-pass demodulator . . 2.2 The channel decoder . . . . . 2.3 The channel encoder . . . . . 2.4 The index calculators . . . . 2.5 The two- and three-pass detectors

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

3 4 4 5 5

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

6 6 6 7 7 7

3 Calculation of bit errors

11

4 Parameters defining multi-pass operation

11

5 References

12

6 The SysSim simulation model 6.1 The top layer . . . . 6.2 The REQU . . . . . 6.3 The multi-pass equalizer 6.4 Bit error calculation . .

. . . .

13 13 14 15 16

7 Template for simulations 7.1 simparam parameters file . . . . . . . . . . . . 7.2 simparam template file . . . . . . . . . . . . .

17 17 17

. . . .

2(19)

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

1 The REQU core

Initial channel estimate together with position of known syncword in received sequence of samples.

Carthesian complex

Feedback information on estimated frequency error

Sequence of samples from diversity path 1

Sequence of samples from diversity path 2

Compute R & Phi

Process R & Phi

Synchronize Demod

Polar complex

Compute R & Phi

Process R & Phi

Synchronize

Adaptive channel equalizer based upon SSVE, FSVE or PFVE scheme

Detected bits

Feedback information on estimated frequency error

Figure 1. A schematic illustration of the REQU core

As a part of implementing and simulating the multi-pass equalizer we have adapted the reference equalizer, REQU, created at T/U to the RBS884 product simulation environment. The REQU itself consists of four blocks: Compute R&Phi, Process R&Phi, Synchronize and Demod (Present code is found in mpass_demod), see Figure 1 and Figure 7. The module Compute R&Phi is intended as a compatibility unit where different types of conversion is made between polar complex representation, cartesian complex representation etc., on samples delivered to the REQU. Compute R&Phi delivers two flows of data, R and Phi, to Process R&Phi for scaling and frequency adjustment. A feedback mechanism exists in order to compensate for frequency error on the received vector of samples. Synchronize correlates the a priori known synchronization word with the received vector of samples in order to find the position of the synchronization word in the received vector of samples. Also the synchronizer delivers a channel estimate which is used in the demodulator to initiate the adaptive process of channel estimation. Demod is the demodulator and detector. The term demodulator is used because the transition from the radio signal, simulated as a complex base band signal, to binary (soft) bits takes place inside Demod. The detector is an adaptive maximum likelihood sequence estimator. 1.1 The module Compute R&Phi Because the REQU is meant to be independent of the environment in which it is used, a compatibility block exists that performs one of several

3(19)

available conversions. The REQU uses polar complex samples internally so for instance cartesian complex samples could be converted to polar complex samples in this block. Compute R&Phi also limits the phase to a value between 0 and 2π. The samples will at this point be π/4-DQPSK, see Figures 2.

pi/4 DQPSK 5 4 3

Quadrature

2 1 0 −1 −2 −3 −4 −5 −5

0 Inphase

5

Figure 2. An example of a signal produced by Compute R&Phi

1.2 The module Process R&Phi The main function of this block is to subtract the π/4 shifts from the samples, see Figure 3. As these were introduced in order to enhance the performance of the linear transmitter filter, they are removed without affecting the detection of the signal. Thereafter the signal will be ordinary DQPSK. Scaling of the samples may also be done with one of several available methods, e.g. scaling to normalize the rout mean square (RMS) value, scaling with max amplitude or no scaling. We recommend scaling with RMS because the delta metrics of the Euclidean distance Viterbi detector may otherwise take on very high values, potentially creating numerical problems. A feedback loop exist from the demodulator and detector, Demod, back to this block and thus makes automatic frequency control possible, i.e. automatic adjustments to the phase based upon information from the demodulator/detector, see Figures 1 and 6. 1.3 The module Synchronize Synchronize will try to find the beginning of the synchronization word in the sampled sequence employing a cross correlation method. Since the synchronization word has an cyclic autocorrelation feature the cross correlation between the sync word in the received sequence and the sync word itself turns out to be a channel estimate. This estimate will be used

4(19)

DQPSK 1.5

1

Quadrature

0.5

0

−0.5

−1

−1.5 −1.5

−1

−0.5

0 Inphase

0.5

1

1.5

Figure 3. An example of a signal produced by Process R&Phi

as an initial value for the adaptive channel estimation scheme, see Figures 1 and 6. 1.4 The module Demod Demod is the main block of the REQU, see Figure 1 and Figure 7. It comprises different channel estimation schemes, a predictor to be used to combat problems arising from the decision delay in the equalizer and the equalizer itself. Demod may be configured in different ways to act as a symbol spaced Viterbi equalizer, SSVE, with a fractionally spaced prefilter also as a prefilter Viterbi equalizer, PFVE and as a fractionally spaced Viterbi equalizer, FSVE. Demod also takes into account diversity through two different diversity channels (distance diversity). The information from the diversity and the oversampled (fractionally spaced) signal is combined in the calculation of the delta metrices. For more information on this confer [2] and [3].

5(19)

2 The Multi-pass Equalizer Scheme f [.] corresponds to the even rows and 1 f2 [.] to the odd rows in terms of the interleaving matrix.

F[k] = { f1[k], f2[k]}

B[k] = { b[k]}

convolutional encoder

S[k] = { f1[k-1], f2[k] }

interleaver

"channel"

~ ~ ~ S[k] = { f1[k-1], f2[k] }

-1 f1[k] f1[k-1] Z

~ S[k]

^ ^ ^ F[k-1] = { f1[k-1], f2[k-1] } detector 1

de-interleaver

^ B[k-1]

(Class 1&2)

convolutional decoder convolutional encoder

-1 ^ ^ f2[k] f2[k-1] Z

^ { f1[k-1], 0 }

prepare feedback

if CRC[i-1] is OK

~ ~ { f1[k-1], f2[k] }

detector 2 (Two-pass)

^ ^ { f1[k-1], f2[k-1] }

Z -1 ~ ~ { f1[k-2], f2[k-1] }

detector 3 (Three-pass)

^ ^ { f1[k-2], f2[k-1] }

(Two-pass)

^ ^ { f1[k-1], f2[k]}

-1 ^ f2[k-1] 0Z

(Class 2 only)

^ ^ { f1[k-2], f2[k-1] }

prepare feedback

if (CRC[i-1] is OK & CRC[i-2] is OK)

(Three-pass) -1 ^ ^ f1[k-1] f1[k-2] Z

Figure 4. The multi-pass re-detection scheme

The multi-pass equalizer consists of a modified REQU with several instances of the Demod module extended with a channel decoder, a noninterleaving channel encoder and special routines for extracting class 1 information from the re-encoded sequence. As is, this system simulates both the two- and three-pass equalizer and a combination of these two, the composite multi-pass equalizer. 2.1 The one-pass demodulator The one pass demodulator consists of the Demod module running in one-pass detector modus, i.e. it makes no use of information on the error corrected class 1 data bits. Different metrics may be used even though the Euclidean distance metric (SqViterbi) were used in the simulations. Thus a prefilter Viterbi equalizer, PFVE, can be used to detect the class 1 data bits together with the first estimated class 2 data bits. 2.2 The channel decoder We use the usual channel decoder in our implementation. What we are interested in here is the class 1 data together with the CRC check flag. Even though we can not prevent the other parts of the multi-pass equalizer from being executed in SysSim when the CRC check fails, the general idea is to only initiate the multi-pass equalizer scheme when we are reasonably sure of having detected the class 1 data bits correctly. For this

6(19)

purpose we use the CRC check flag from the decoder. Keep in mind though that the CRC check involves the class 1a bits only. There is an inherent problem with this because we may use incorrect information on class 1b bits when we experience (heavy) garbling of class 1b bits without having a CRC fail situation for the class 1a bits. 2.3 The channel encoder After decoding a frame from the ordinary demodulator/detector we reencode it under the assumption of having received all class 1 bits correctly. Observe that the usual interleaving is omitted to avoid a time delay. 2.4 The index calculators The index calculator codes all channel encoded class 1 data bits, or a partition thereof, received from the channel encoder in such a manner that all zeros are converted to -1 and all ones are converted to +1 while at the same time setting all class 2, SACCH and CDVCC bits to zero. Also it inserts zeros in place of the synchronization word. This results in a 312 bit vector reflecting all data bits in the received frame, i.e. 16 bits UCH, 28 bits SYNC, 122 bits UCH, 12 bits SACCH, 12 bits CDVCC and 122 bits UCH. When the CRC check is non-affirmative, the index calculator delivers all zeros, reflecting that no information is supplied for the corresponding frame. The two-pass index-calculator sets every second row to zero to indicate the lack of knowledge of these bits due to the interleaving. The three-pass index-calculator interleaves the current burst with the previous to create a frame, which produces a time-delay. The twopass index calculator only considers the CRC for the current frame, while the three-pass index calculator also has demands for an affirmative CRC for the previous frame. 2.5 The two- and three-pass detectors When re-detecting B[k] consisting of the parts {c1[k-1], c2[k]} the frame C[k-1] holding {c1[k-1], c2[k-1]} has been produced by the second encoder, see Figure 4. Thus only the class 1 bits in the fraction c1[k-1] can be used as known. The three-pass re-detection holds a time-delay which implies that when re-detecting B[k] both C[k-1] and then C[k] have been produced by the second encoder. All class 1 bits can be used as known, where c1[k-1] is taken from C[k-1] and c2[k] from C[k]. See Figures 4 and 7. The two pass detector makes use of information on class 1 data bits computed in the one-pass detector and converted during the process of channel encoding and index calculation (see above). Only the Euclidean distance metric Viterbi is modified to make use of this information and the two- and three-pass detectors may only be run in this mode. The idea is that given information on convolutional- and block coded class 1

7(19)

data bits, i.e. data bits that we may check for correctness, we prune the trellis to reflect that we for some samples know what phase shifts should occur and thus may increase the ability to detect the intermingling class 2 data bits correctly. In the actual pruning process we use the 312 bit index vector, that is aligned with the 312 bit information part of the received frame, while processing the received signal. At all locations in the index vector where the value differ from zero, i.e. positions held by known bits, we assume we know these bits with absolute certainty thus setting the specific ∆-metrics to infinity. This forces the Viterbi algorithm to exclude all paths not corresponding to the known phase shifts through the trellis. In the three-pass case we perform a regular interleaving after having encoded the data. The received frame on which the re-detection process is initiated must therefore be delayed one frame. All class 1 bits are considered to be known in this scheme. The composite multi-pass detector combines the class 2 bits from the two-pass detector and the three-pass detector. The class 1 bits are taken from the one-pass receiver. After having received B[k] by the one-pass receiver, both a re-detection of B[k] by the two-pass detector and a redetection of B[k-1] by the three-pass detector, is initiated. From these two re-detected bursts the class 2 bits are taken to form the class 2 bits fraction of F[k-1]. B[k], holds {c1[k-1], c2[k]} and B[k-1], holds {c1[k-2], c2[k-1]} thus the class 2 bits of c1[k-1] are taken from the two-pass detector and the class 2 bits of c2[k-1] are taken from the three-pass detector, see Figures 4 and 7. For a further discussion on this subject, please see [4]. 2.5.1 The restraining of the trellis implemented in the two- and three-pass detectors The detection is done by means of a coherent Viterbi equalizer with a subsequent differential decoder, implying coherent symbol detection with the aid of the trellis, and then differential decoding of the coherent symbols. In differential quadrature phase shift keying (DQPSK), as used in DAMPS, the information lies in the differential phase shifts rather than in the absolute phase of the signal. A set of information bits correspond to a certain phase shift, see Figure 5. If we, prior to detecting a differential symbol, have knowledge of one or both of the corresponding bits we may restrain, or prune, the (number of) transitions in the trellis. Since some causes to an erroneous detection have been left out by means of the pruning, we may re-detect a differential symbol with an

8(19)

Q π/2 ~ (-1,1) (-1,-1) ~ 0

I (1,-1) ~ 3π/2

π ~ (1,1)

Figure 5. A symbol represented by two bits

increased possibility of making the correct decision. In the specific environment of IS-54 we experience both fully known and partially known symbols. Due to unequal protection of transmitted bits, we may use the protected bits, if they are successfully received, for restraining the trellis in a subsequent re-detection of bits with no protection. Based upon the depth of the interleaving scheme employed, such a re-detection may be performed on the currently received burst, or on previously received bursts. Also the effectiveness of this multi-pass re-detection scheme is dependent on the intra-burst interleaving employed. From the point of view of this method, the performance gain is dependent of the pattern of interspersing (fully or partially) known symbols among unknown symbols (symbols with a lower degree of error protection). 2.5.2 The influence that the restraining has on the trellis The detector is a TS/2 fractionally spaced maximum likelihood sequence estimator (MLSE), with a 4-state Viterbi algorithm (VA). In the two-pass and three-pass detectors the trellises of the VA are forced to take predestinated paths corresponding to known class 1 bits. The differential detection of the DQPSK signal is implemented by a coherent Viterbi detector with a subsequent differential decoder. This implies that parallel transitions in the trellis are equal since they represent an equal difference in phase. If bits corresponding to a certain phase shift are known, the trellis is restrained so that only transitions corresponding to this known phase shift are allowed. Due to this, the quick merge of nodes in the two- and three-pass detectors are prevented where the trellises are pruned. Instead, the paths are forced apart.

9(19)

3 Calculation of bit errors No “physical” speech-frame is assembled in this implementation. Based on the CRC check from the one-pass channel decoder, we choose to count bit errors either from the two-/three-pass channel decoder (when CRC is affirmative) or from the one-pass channel decoders. If, for instance, this system should be used to produce “physical” frames, e.g. with “real” speech-coded signals, code would have to be written to assemble frames. The present code is found in mpass_ber_calc.C.

4 Parameters defining multi-pass operation A proper template file for simparam execution of the multi-pass equalizer is found in the file named mpass_dvc.it. See also Section 7.

10(19)

5 References [1] P. Dent, “Invention disclosure of Decodulation,” Internal Document Ericsson-General Electric, RTP/EGE/CT/Y 93:0009, May 1993. [2] K. Jamal, “Equalization for the ADC standard,” Internal report T/U 91:260, 1991. [3] K. Jamal, “Fractionally Spaced Viterbi Equalization,” Internal report T/BU 92:075, 1992. [4] P. Deutgen & F. Randers, “Forward-Error-Control-Assisted Detection,” Master’s Thesis 1994:149E, Luleå University of Technology, Div. of Signal Processing, 1994.

11(19)

6 The SysSim simulation model 6.1 The top layer rndInt rnd_source

rndCarr rnd_source

int RATE=1 int seed=564523624 int blocklength=284

dcet mod_dcet

int RATE=1 int seed=230547080 int blocklength=159

outFrame

outFrame

int RATE=1 bool PartOfDecodulator=FALSE int facchFlag=0 outFrameNew int dvccPar=10 int oblocklength=284 int iblocklength=159 outFrame

inFrame

dmtCarr dmt_sim dmtInt dmt_sim

inFrame

int RATE=1 float offset_q=0 float gain_q=1 outFrame inFrame float offset_i=0 float gain_i=1 int startTA=0 int timeAlign=0 int startGuard=30 int dvccPar=10 int syncNr=1 int burst_mode=1 int filter_mode=1 int upsa=4 bool imp_model=TRUE float bt=0.2 float window_offset=0 float beta=0 float alpha=0.35 float imp_length=12 float ampl=5100 SimStr inFileName="dmt/test/wfg_filter.dat" int oblocklength=1584 int iblocklength=284

inFrame

int RATE=1 float offset_q=0 float gain_q=1 outFrame float offset_i=0 float gain_i=1 int startTA=0 int timeAlign=0 int startGuard=30 int dvccPar=10 int syncNr=2 int burst_mode=1 int filter_mode=1 int upsa=4 bool imp_model=FALSE float bt=0.2 float window_offset=0 float beta=0 float alpha=0.35 float imp_length=10 float ampl=5150 SimStr inFileName="dmt/test/wfg_filter.dat" int oblocklength=1584 int iblocklength=284

ratrxA ratrx int RATE=1 int SEED=1986921971 int blocklength=1584

int RATE=1 int SEED=1202277023 int blocklength=1584

rachOut

rachIn1

rachOut1

dfiltA dfilt int RATE=1

int RATE=1 double maxOut=256 int outBits=0 int blocklength=1584

outFrame

outFrame

phi

dfiltB dfilt

pdigtB pdigt

int RATE=1

rssout

iqout

rachIn

rss

ratrxB ratrx

inFrame

outFrame

rssout

inFrame

rss

inFrame

outFrame

int RATE=1 float SAMPLERATE=194400

int RATE=1 int blocklength=1584 int SAMPLERATE=194400

pdigtA pdigt

iqout

int RATE=1 int blocklength=1584 int SAMPLERATE=194400

rach rach

rattxInt rattx

inFrame

inFrame

rattxCarr rattx

int RATE=1 double maxOut=256 int outBits=0 int blocklength=1584

outFrame

outFrame

phi

ber_calc ber_calc int RATE=1

dequdect equdec

source_in

coded_in int RATE=1 in_frame_A

detected_frame_one

detected_frame_one

in_frame_B

detected_frame_two

detected_frame_two

detected_frame_three

detected_frame_three

uch_frame_one

uch_frame_one

uch_frame_two

uch_frame_two

uch_frame_three

uch_frame_three

facch_frame_one

facch_frame_one

sacch_frame_one

sacch_frame_one

data_crc_flag_one

data_crc_flag_one

data_crc_flag_two

data_crc_flag_two

data_crc_flag_three

data_crc_flag_three

sacch_crc_flag_one

sacch_crc_flag_one

dvcc_status_one

dvcc_status_one

ber_estimate_one

ber_estimate_one

This is the top model of the multi-pass simulation chain, based upon the SysSim chain for dvc_1.29.

Figure 6.

12(19)

y

y

Figure 7.

13(19)

int RATE=1 int ConversionMode=1 int blocklength=1584

crphiB computerphi

int RATE=1 int ConversionMode=1 int blocklength=1584

crphiA computerphi

phi_in

phi

phi_in

phi

FEEDBACK

r_in

r

fe_est_in

r_in

r

fe_est_in

FEEDBACK

RATE=1 AFCMode=0 AGCMode=1 blocklength=1584

int int int int

RATE=1 AFCMode=0 AGCMode=1 blocklength=1584

prphiB processrphi

int int int int

prphiA processrphi

phi_out

r_out

phi_out

r_out

phi

r

phi

r

int RATE=1 float WeightFactor=1.05 float SyncLp=0.02 float MuGainLimit=1000 float MuSlope=0.08 float CorrMin=30 int NmbSncWds=1 int SncNmbNxt=2 int SncNmb=1 int MuMapping=0 int MuAlpha=1 int FloatWnd=0 int WndLen=32 int NmbHTaps= int ExpectedPos=244 int DownSampFactor=1 int CorrelationMode=1 int FseFactor= int filterlength=20 int blocklength=1584

syncB synchronize

int RATE=1 float WeightFactor=1.05 float SyncLp=0.02 float MuGainLimit=1000 float MuSlope=0.08 float CorrMin=30 int NmbSncWds=1 int SncNmbNxt=2 int SncNmb=1 int MuMapping=0 int MuAlpha=1 int FloatWnd=0 int WndLen=32 int NmbHTaps= int ExpectedPos=244 int DownSampFactor=1 int CorrelationMode=1 int FseFactor= int filterlength=20 int blocklength=1584

syncA synchronize

tap_gains_B

direction_B

direction

h_init_B

start_sample_B

in_frame_phi_B

in_frame_r_B

in_frame_r_A

tap_gains

h_init

start_sample

direction_A

direction

in_frame_phi_A

tap_gains_A

h_init_A

start_sample_A

tap_gains

h_init

start_sample

int RATE=1

mpass_equ mpass_equ

dvcc_status_one

ber_estimate_one

ber_estimate_one

fe_est_frame_B

sacch_crc_flag_one

dvcc_status_one

data_crc_flag_two

data_crc_flag_one

sacch_frame_one

facch_frame_one

uch_frame_three

uch_frame_two

uch_frame_one

detected_frame_three

detected_frame_two

detected_frame_one

data_crc_flag_three

int RATE=

sacch_crc_flag_one

in_frame_B

in_frame_A

data_crc_flag_three

data_crc_flag_two

data_crc_flag_one

sacch_frame_one

facch_frame_one

uch_frame_three

uch_frame_two

uch_frame_one

detected_frame_three

detected_frame_two

detected_frame_one

fe_est_frame_A

@ equdec

This is part of the model for the multi-pass simulation chain.

6.2 The REQU

int RATE=1 float ExpectedFeEst=0 float Afc3=0.1 float Afc2=0.001 float Afc1=0.01 int Afc5=3 int Afc4=50 int AfcMode=0 float MuMpl=0.033 float Mu=0.15 float Wd=0.02 float Rd=0.995 float Gamma=0.0001 float IsiLp=0.02 int CdvccNmb=10 int SncNmb=1 int StartGuard=30 int FeedbackMode=1 int PassNmb=1 int ExpandedMode=0 int AdaptationMode=1 int NmbDivCh=2 int DecDelay=4 int UpdDelay=2 int SLength=1 int NmbHTaps=4 int FseFactor=2 bool VDD=FALSE bool Soft=TRUE bool Weighting=TRUE bool Prediction=TRUE int oblocklength=284 int filterlength=20 int iblocklength=1584 int indexlength=1

Figure 8.

14(19) int int int int

From model input

directionB

tapGainsB

hInitB

startSampleB

inFramePhiB

inFrameRB

directionA

tapGainsA

hInitA

startSampleA

inFramePhiA

inFrameRA

indexFrame

RATE=1 PASS_SELECTOR=2 EXPANDED_MODE=3 INDEX_LENGTH=312 outFrameDet

fe_est_frame_B

fe_est_frame_A

int RATE=1 int PASS_SELECTOR=2

two_pass_dcdt mpass_dcdt

int RATE=1 int individ=1 int interMix=0 bool facchFlag=FALSE int dvccPar=10 int softLim=12 int noSoftBits=10 int softCh=1 int burstMode=1 int simMode=0

detected_frame

out_frame_det inFrame

one_pass_dcdt dcdt_sim

data_crc_flag

decoded_frame

berEstimate

dvccStatus

sacchCrcFlag

dataCrcFlag

sacchFrame

facchFrame

speechFrame

outFrame

outFrame

outIndexBitsFrame

outhInitA

outtapGainsA

outdirectionA directionA

outFrameRB

outFramePhiB

outstartSampleBstartSampleB

outhInitB

outtapGainsB

outdirectionB directionB

inhInitA

intapGainsA

indirectionA

inFrameRB

inFramePhiB

instartSampleB

inhInitB

intapGainsB

indirectionB

tapGainsB

hInitB

inFramePhiB

inFrameRB

tapGainsA

hInitA

outstartSampleAstartSampleA

instartSampleA

inFramePhiA

inFrameRA

indexFrame

outFramePhiA

int RATE=1 int filterlength=20 int blocklength=1584

outFrameRA

outIndexBitsFrame

three_pass_delay three_pass_delay

RATE=1 IndexData=1 PassSelector=2 oframelength=312 iframelength=284

inFramePhiA

inFrameRA

From model input

int int inCRCFromOnePass int int int inCodedBitsFrame

two_pass_index_calc index_calc

RATE=1 IndexData=1 PassSelector=3 oframelength=312 iframelength=284

three_pass_index_calc index_calc

int RATE=1 int seed=1994 int blocklength=1

dummy_index rnd_source

int RATE=1 bool DECODULATOR=TRUE

int int inCRCFromOnePass int int int inCodedBitsFrame

inFrame

noninterl_dcet mpass_dcet

int RATE=1 int PASS_SELECTOR=3 int EXPANDED_MODE=3 int INDEX_LENGTH=312

three_pass_ddt ddt

This is part of the model for the multi-pass simulation chain.

two_pass_ddt ddt

From model input

direction_B

tap_gains_B

h_init_B

start_sample_B

in_frame_phi_B

in_frame_r_B

direction_A

tap_gains_A

h_init_A

start_sample_A

in_frame_phi_A

in_frame_r_A

index_frame

one_pass_ddt mpass_demod

outFrameDet

int RATE=

detected_frame

int RATE=1 int PASS_SELECTOR=3

three_pass_dcdt mpass_dcdt

direction_B

tap_gains_B

h_init_B

start_sample_B

in_frame_phi_B

in_frame_r_B

in_frame_r_A

in_frame_phi_A

direction_A

tap_gains_A

h_init_A

start_sample_A

@ mpass_equ

data_crc_flag

decoded_frame

fe_est_frame_B

ber_estimate_one

dvcc_status_one

sacch_crc_flag_one

data_crc_flag_three

data_crc_flag_two

data_crc_flag_one

sacch_frame_one

facch_frame_one

uch_frame_three

uch_frame_two

uch_frame_one

detected_frame_three

detected_frame_two

detected_frame_one

fe_est_frame_A

6.3 The multi-pass equalizer

6.4 Bit error calculation

one_pass_ber_calc ber_calc_xl int RATE=1 int dvccPar=10 int burstMode=1 bool facchFlag=0 int statInterval=200 int skipNr=100 int errDataOut=0

sourceIn

codedIn

modemIn

decodedIn

facchIn

This is part of the model for the multi-pass simulation chain.

sacchIn

dataCrcFlag

sacchCrcFlag

dvccStatus

berEstimate

@ ber_calc

two_pass_ber_calc mpass_ber_calc

int RATE= source_in

int int int int int int

coded_in

sourceIn

detected_frame_one

codedIn

detected_frame_two

modemInOne

detected_frame_three

modemIn

uch_frame_one

decodedInOne

uch_frame_two

decodedIn

uch_frame_three

dataCrcFlagOne

facch_frame_one

dataCrcFlag

sacch_frame_one

berEstimate

RATE=1 PassSelector=2 burstMode=1 statInterval=200 skipNr=100 errDataOut=0

data_crc_flag_one

data_crc_flag_two

data_crc_flag_three

sacch_crc_flag_one

dvcc_status_one

three_pass_delay ber_calc_delay

ber_estimate_one

three_pass_ber_calc mpass_ber_calc

int RATE=1 sourceIn

sourceOut

sourceIn

codedIn

codedOut

codedIn

modemIn

modemOut

modemInOne

decodedIn

decodedOut

modemIn

dataCrcFlag

dataCrcFlagOut

decodedInOne

berEstimate

berEstimateOut

decodedIn

Eat_CRC dummysink_i

inFrame

int RATE= 1 bool debug=FALSE int blocklength=1

Figure 9.

15(19)

dataCrcFlagOne

dataCrcFlag

berEstimate

int int int int int int

RATE=1 PassSelector=3 burstMode=1 statInterval=200 skipNr=100 errDataOut=0

7 Templates for simulation 7.1 The simparam parameters file FADE TAU CIR SNR FREQ_ERR CH_SEP STEP

7 77 0 2 4 8 4 5 8 10 12 14 16 18 35 0 0 3101

7.2 The simparam template file sim build /* Set RATE */ set **/RATE 1 /* Set simulation parameters */ set set set set set set set

**/DOPPLERFREQ FADE **/dopplerFreq FADE **/snrDb SNR **/cOverIdB1 CIR **/delay TAU **/ST1/freqErr FREQ_ERR **/channelSep1 CH_SEP

/* Set other parameters */ set /LogStat/SimName SIM_NAME set /LogStat/SimRunName SIM_RUN_NAME set /LogStat/ResultPathName RESULT_PATH_NAME set /mpass_dvc/ratrx?/mf1/INFILENAME butt4_165e2_194e3.hz” set /mpass_dvc/ratrx?/mf2/INFILENAME iir2gaus3_194e3.hz”

“rat/filter/ “rat/filter/

cd /mpass_dvc/dfiltA source dfilt/dfilt.ini cd /mpass_dvc/dfiltB source dfilt/dfilt.ini cd / /*--------------------------------------------------Parameters used to force dfilt to produce (i,q) samples,i.e. carthesian complex samples instead of any obfuscated (rss,phi) samples that we would have to

16(19)

invert anyway. *--------------------------------------------------*/ set /mpass_dvc/dfiltA/t2/bypass TRUE set /mpass_dvc/dfiltA/t2/eqmode FALSE set /mpass_dvc/dfiltB/t2/bypass TRUE set /mpass_dvc/dfiltB/t2/eqmode FALSE /*--------------------------------------------------Parameters used to force dfilt to skip the suspicious “ladder”-mode. Instead we use a simple filter which only amplifies the signal with a constant gain = b0 *--------------------------------------------------*/ set /mpass_dvc/dfilt?/mf22/bypass FALSE set /mpass_dvc/dfilt?/mf22/ladderMode FALSE set /mpass_dvc/dfilt?/mf22/b0 1000 /*--------------------------------------------------The correlation between the carrier and the interferer in the two ray model. This together with the amplitude of the interferer relative the carrier ‘amplitude’ may be used to simulate a flat non fading channel (correlation=1, amplitude=”-200”). See below for FADE == 0. *--------------------------------------------------*/ set **/CORR/correlation 0.7 /*--------------------------------------------------Statistical interval is now set to 200. That means that the number of simulations will be broken down into small pieces on which we may build more robust statistics *--------------------------------------------------*/ set **/statInterval 200 set **/COVERICHA/skipNr 100 set **/COVERICHB/skipNr 100 set **/TXCMOD/skipNr 100 /*--------------------------------------------------Since dmt comprises a program written in pascal as well as one written in C++, neither one being possible to instantiate, we must choose different models for the modulator of the carrier and the modulator of the interferer. For the carrier we choose the C++ model (implementation model TRUE) and for the interferer the Pascal program (implementation model FALSE). *--------------------------------------------------*/ set /mpass_dvc/dmtCarr/imp_model True set /mpass_dvc/dmtCarr/imp_length 12 set /mpass_dvc/dmtCarr/ampl 5100 set /mpass_dvc/dmtInt/ampl 5150 /* Set dequdect parameters */ cd /mpass_dvc/dequdect

17(19)

set set set set set set set

crphi?/ConversionMode 1 prphi?/AGCMode 1 sync?/FseFactor 2 sync?/ExpectedPos 244 sync?/CorrelationMode 1 sync?/WndLen 32 sync?/WeightFactor 1.5

/* Set mpass_equ parameters */ cd /mpass_dvc/dequdect/mpass_equ/one_pass_ddt set Weighting TRUE set IsiLp 0.02 set FeedbackMode 1 set FseFactor 2 set NmbDivCh 2 set ExpandedMode 0 set SLength 1 cd /mpass_dvc/dequdect/mpass_equ/two_pass_ddt/demod set Weighting TRUE set IsiLp 0.02 set FeedbackMode 1 set FseFactor 2 set NmbDivCh 2 set ExpandedMode 3 set SLength 1 cd /mpass_dvc/dequdect/mpass_equ/three_pass_ddt/demod set Weighting TRUE set IsiLp 0.02 set FeedbackMode 1 set FseFactor 2 set NmbDivCh 2 set ExpandedMode 3 set SLength 1 cd / /* BER calculation */ set **/errDataOut 0 set **/statInterval 200 set **/skipNr 100 cd /mpass_dvc/ber_calc set one_pass_ber_calc/skipNr 100 set two_pass_ber_calc/skipNr 100 set three_pass_ber_calc/skipNr 101 cd / #if FADE==0 set **/CORR/correlation 1.0 set **/amplitude “-200”

18(19)

set **/statInterval 200 #endif #if FADE==7 set **/statInterval 500 #endif #if FADE==77 set **/statInterval 200 #endif sim cons /* Simulate */ sim start s s STEP sim stop exit

19(19)

Related Documents


More Documents from ""