A COMPUTATIONAL PARADIGM FOR SPACE-TIME MULTIUSER DETECTION. Lisa Welburn*, Jim Cavers*, Kevin Sowerby** ** The University of Auckland, New Zealand

Similar documents
The Conditional Metric Merge Algorithm for Maximum Likelihood Multiuser-Macrodiversity Detection

ICI Mitigation for Mobile OFDM with Application to DVB-H

Statistical Communication Theory

Diversity Techniques

The Case for Optimum Detection Algorithms in MIMO Wireless Systems. Helmut Bölcskei

Joint Viterbi Decoding and Decision Feedback Equalization for Monobit Digital Receivers

Near-Optimal Low Complexity MLSE Equalization

Layered Space-Time Codes

ELEC E7210: Communication Theory. Lecture 11: MIMO Systems and Space-time Communications

Communications Theory and Engineering

AN INTRODUCTION TO ERROR CORRECTING CODES Part 2

Revision of Lecture Twenty-Eight

CHANNEL MEASUREMENT. Channel measurement doesn t help for single bit transmission in flat Rayleigh fading.

Design and Analysis of Performance Evaluation for Spatial Modulation

Advanced channel coding : a good basis. Alexandre Giulietti, on behalf of the team

PERFORMANCE AND COMPARISON OF LINEAR MULTIUSER DETECTORS IN DS-CDMA USING CHAOTIC SEQUENCE

CHAPTER 5 DIVERSITY. Xijun Wang

SYMBOL BY SYMBOL SOFT-INPUT SOFT-OUTPUT MULTIUSER DETECTION FOR FREQUENCY SELECTIVE MIMO CHANNELS

Near-Optimal Low Complexity MLSE Equalization

SPACE TIME coding for multiple transmit antennas has attracted

K.NARSING RAO(08R31A0425) DEPT OF ELECTRONICS & COMMUNICATION ENGINEERING (NOVH).

Outline. Communications Engineering 1

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm

Decoding Distance-preserving Permutation Codes for Power-line Communications

Multiuser Detection for Synchronous DS-CDMA in AWGN Channel

Smart Antenna ABSTRACT

Photons and solid state detection

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.

6. FUNDAMENTALS OF CHANNEL CODER

MULTIPLE ACCESS SCHEMES OVERVIEW AND MULTI - USER DETECTOR

WITH the introduction of space-time codes (STC) it has

Partial Decision-Feedback Detection for Multiple-Input Multiple-Output Channels

6 Uplink is from the mobile to the base station.

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Hello and welcome to today s lecture. In the last couple of lectures we have discussed about various transmission media.

COUNTING AND PROBABILITY

DOPPLER PHENOMENON ON OFDM AND MC-CDMA SYSTEMS

An HARQ scheme with antenna switching for V-BLAST system

Image Forgery. Forgery Detection Using Wavelets

Adaptive Wireless. Communications. gl CAMBRIDGE UNIVERSITY PRESS. MIMO Channels and Networks SIDDHARTAN GOVJNDASAMY DANIEL W.

Master s Thesis Defense

Lectures: Feb 27 + Mar 1 + Mar 3, 2017

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

ABHELSINKI UNIVERSITY OF TECHNOLOGY

Comparison of MIMO OFDM System with BPSK and QPSK Modulation

Sphere Decoding in Multi-user Multiple Input Multiple Output with reduced complexity

Final Exam (ECE 408/508 Digital Communications) (05/05/10, Wed, 6 8:30PM)

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

A new receiver for digital mobile radio channels with large multipath delay

Proposed Graduate Course at ANU: Statistical Communication Theory

ON SAMPLING ISSUES OF A VIRTUALLY ROTATING MIMO ANTENNA. Robert Bains, Ralf Müller

Adaptive Beamforming for Multi-path Mitigation in GPS

MMSE Algorithm Based MIMO Transmission Scheme

A Chip-Rate MLSE Equalizer for DS-UWB Systems

MULTISPECTRAL IMAGE PROCESSING I

CH 4. Air Interface of the IS-95A CDMA System

Channel Estimation and Signal Detection for Multi-Carrier CDMA Systems with Pulse-Shaping Filter

Chapter- 5. Performance Evaluation of Conventional Handoff

Lecture 9b Convolutional Coding/Decoding and Trellis Code modulation

Coalescent Theory: An Introduction for Phylogenetics

Antennas and Propagation. Chapter 6d: Diversity Techniques and Spatial Multiplexing

A Sliding Window PDA for Asynchronous CDMA, and a Proposal for Deliberate Asynchronicity

6 Multiuser receiver design

photons photodetector t laser input current output current

UNIVERSITY OF CALIFORNIA College of Engineering Department of Electrical Engineering and Computer Sciences EECS 121 FINAL EXAM

SPACE TIME CODING FOR MIMO SYSTEMS. Fernando H. Gregorio

A Gentle Introduction to Dynamic Programming and the Viterbi Algorithm

Hybrid QR Factorization Algorithm for High Performance Computing Architectures. Peter Vouras Naval Research Laboratory Radar Division

Permutations and Combinations

Performance Analysis and Receiver Design for SDMA-Based Wireless Networks in Impulsive Noise

EFFECTIVE CHANNEL CODING OF SERIALLY CONCATENATED ENCODERS AND CPM OVER AWGN AND RICIAN CHANNELS

Cooperative Sensing for Target Estimation and Target Localization

Trellis-Coded Modulation [TCM]

# 12 ECE 253a Digital Image Processing Pamela Cosman 11/4/11. Introductory material for image compression

PERFORMANCE ANALYSIS OF AN UPLINK MISO-CDMA SYSTEM USING MULTISTAGE MULTI-USER DETECTION SCHEME WITH V-BLAST SIGNAL DETECTION ALGORITHMS

Channel Coding RADIO SYSTEMS ETIN15. Lecture no: Ove Edfors, Department of Electrical and Information Technology

Single-Carrier Space Time Block-Coded Transmissions Over Frequency-Selective Fading Channels

Performance Comparison of Spreading Codes in Linear Multi- User Detectors for DS-CDMA System

Designing Information Devices and Systems I Spring 2016 Official Lecture Notes Note 18

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Performance Evaluation of the VBLAST Algorithm in W-CDMA Systems

DESIGN AND ANALYSIS OF VARIOUS MULTIUSER DETECTION TECHNIQUES FOR SDMA-OFDM SYSTEMS

Image Processing (EA C443)

CHAPTER 6 SPREAD SPECTRUM. Xijun Wang

SEVERAL diversity techniques have been studied and found

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS

Wireless Multiple Access Communication over Collision Frequency Shift Channels

SYSTEM-LEVEL PERFORMANCE EVALUATION OF MMSE MIMO TURBO EQUALIZATION TECHNIQUES USING MEASUREMENT DATA

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOCK CODES WITH MMSE CHANNEL ESTIMATION

THE advent of third-generation (3-G) cellular systems

A Sphere Decoding Algorithm for MIMO

MITIGATING INTERFERENCE TO GPS OPERATION USING VARIABLE FORGETTING FACTOR BASED RECURSIVE LEAST SQUARES ESTIMATION

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1

SINCE its inception, cognitive radio (CR) has quickly

Partially Overlapped Channel Assignment for Multi-Channel Wireless Mesh Networks

Dynamic Programming in Real Life: A Two-Person Dice Game

Algorithms for Genetics: Basics of Wright Fisher Model and Coalescent Theory

Transcription:

A COMPUTATIONAL PARADIGM FOR SPACE-TIME MULTIUSER DETECTION Lisa Welburn*, Jim Cavers*, Kevin Sowerby** * Simon Fraser University, Canada ** The University of Auckland, New Zealand 1

OUTLINE: Space-time MUD and the value of ML The Viterbi algorithm reinterpreted MUD in space the new CMM algorithm MUD in space-time 2

1. ML-MUD in Space This picture is ingrained mobiles belong to a cell, that is, a base station. But some mobiles can be received by more than one base. Normally, we deal with it by: ignoring it; or soft handoff; or some ad hoc form of macrodiversity. 3

What if there were no cells, or irregular, overlapping cells? Examples: indoor systems, campus networks. The picture: View antennas as sensors in a common field. Each antenna picks up a subset of the users, and the subsets overlap. Interference mitigation is a central issue. It is most effective if bases pool information over a backbone wireline network and perform multiuser detection. 4

Linear or nonlinear MUD? Contrast a single base station s use of MMSE estimation and ML estimation of transmitted data from mobiles: With MMSE estimation, error rate degrades rapidly with increasing user numbers. ML detection retains diversity order and good error rate, almost irrespective of number of users but its computational load is very large. 5

There is strong motivation find methods that offer near-ml performance with greatly reduced computational load, or do ML in some way that keeps the exponent of growth to a minimum. We explore the second tack today. Our goal: joint ML detection of every bit sent by every user. The spatial dimension overlapping subsets of received users is critical. Our solution: a new algorithm, based on dynamic programming, that keeps the exponent of growth to a minimum in various time-space configurations; conditional metric merge (CMM); the algorithm serves as a computational model on which suboptimal, lower computation, algorithms can be based. 6

2. Signals and Interference Many mobiles, many antennas Mobiles send sequence of pulses weighted by discrete data values, like ( ) 1 k b n =± for mobile k = 1 K, time n= 1 N. Aggregate symbols to b () n. Measurement at antennas at each symbol time: y ( n ) for antenna m = 1 M. Aggregate to y ( n). m Stack all measurements and data for n = 1 N, to get y = Cb+ n Discrete b affects noisy measurements linearly. 7

Details: gain matrix C is composed of MxK blocks; system structure determines block structure. If echoes are limited, then y(n) depends on mobile bits b(n) at a few consecutive times; e.g., n, n-1 if a short impulse response, giving C a block diagonal and block subdiagonal only. Viterbi algorithm. Not all mobiles appear significantly at all antennas. The blocks will contain zeros, and rows will contain different user subsets. Spatial CMM algorithm. 8

ML detection: With uncorrelated noise components, the loglikelihood of some candidate data vector b (all bits from all users) is proportional to y Cb 2 Just run through all 2 NK candidate b values, and choose the one with the smallest metric (!) But all is not lost the metric is a sum of contributions from each measurement (in time and space) 2 y Cb = y ( n) C b ( n) m nm+ mnk, + k k n m k The gain matrix C has a sparse structure, so each measurement depends on a relatively small number of bits. 2 9

Dynamic programming can be applied usefully to a problem if: and 1. The optimal solution consists of optimal solutions to a set of subproblems, each of which consists of optimal solutions to a set of subsubproblems i.e., the optimal solution has a recursive structure. In our case, the lowest level subproblem is optimisation at each measurement y ( n ), although recursion is based m on larger aggregates of measurements. 2. The subproblems overlap, so that subproblems share subsubproblems. In our case, the metrics associated with the measurements include different, but possibly overlapping, sets of users. Unlike pure recursion, which may solve shared subsubproblems repeatedly, DP solves them once and saves the result for combinations at the next higher level. 1

3. Viterbi Reinterpreted The most famous application of dynamic programming is the Viterbi Algorithm, a ubiquitous component of communication systems. We ll review what is now the conventional description, then reinterpret it as a stepping stone to the new spatial extension. 11

Consider a single source and a single receiver, binary (±1) transmission, some echoes, so that the measurement at any symbol time is affected by (say) 3 successive bits. y(3) y(4) y(5) y(6) y(7) b(1) b(2) b(3) b(4) b(5) b(6) b(7) The contribution to the metric from measurement n is µ = yn ( ) cbn ( ) cbn ( 1) cbn ( 2) 1 2 2 and the gains matrix looks like C c 2 c 1 c 2 c c 1 c 2 c c 1 c c c 1 c 12

Signals are usually represented by a trellis of data possibilities, where a state is 2 successive bits, so that a trellis transition (a branch) specifies the required 3 successive bits. + + n-3 n-2 n-1 n + - - + - - Problem: Many paths through the trellis terminate at a particular state at the final time N. Find the one with minimum sum of branch metrics. Then select the state with the correspondingly minimised metric and release its minising path. 13

The Viterbi recursion: Assume that the problem has been solved up to time n-1; that is, for each state at n-1 (say, +-), we have - the accumulated metric M ( n 1) + - the survivor path P ( n 1) of bits prior to those in the state + + + n-3 n-2 n-1 n + - - + - - 14

The update: the best path terminating in state (say) ++ at time n must go through one of ++ or -+ at time n-1. + + + - n-3 n-2 n-1 n µ ( ++ ++ ) M ++ (n-1) µ ( + ++ ) - + M -+ (n-1) - - - Add the metrics: M ++ M++ ( n 1) + µ ( yn ( ), ++ ++ ) ( n) = or M + ( n 1) + µ ( yn ( ), + ++ ) Select the smaller. Suppose it is -+ - the me tric is then M ( n) = M ( n 1) + µ ( yn ( ), + ++ ) ++ + and the survivor path is ( n ) P ( n) = P ( 1), ++ + 15

Repeat for remaining states at time n : + + n-3 n-2 n-1 n + - - + - - then move on to n+1,,n and it s done. The VA exploits the sparsity and locality of C entries to keep the computation proportional to the number of branches. So it s 3 2 N linear in N, exponential only in the number of bits that affect any measurement. 16

Now to go over the problem again with the tabular orientation typical of much dynamic programming. Two subproblems at time n: best path b[1:n-1] and metric M(n-1) based on y[1:n-1]; best selection of bits b[n-2:n] based on y[n]. They overlap. Distinguish between live bits ones that can affect future measurements and dead bits ones that form the survivor path in the trellis description. We index the solutions to the first subproblem by its live bits: b(n-2) b(n-1) P(n-1) M(n-1) +1 +1 P ( n 1) M ( n 1) ++ ++ +1-1 P ( n 1) M ( n 1) + + -1 +1 P ( n 1) M ( n 1) + + -1-1 P ( n 1) M ( n 1) 17

Index solutions to the second subproblem by the bits that affect it b(n-2) b(n-1) b(n) µ +1 +1 +1 µ(+++) +1 +1-1 µ(++-) +1-1 +1 µ(+-+) +1-1 -1 µ(+--) -1 +1 +1 µ(-++) -1 +1-1 µ(-+-) -1-1 +1 µ(--+) -1-1 -1 µ(---) We can add metrics of the two subproblems directly only if they have the same live bits. Unfortunately, the first subproblem has only b(n-2), b(n- 1) a table of four rows. 18

Bookkeeping solution: replicate those table entries for alternative values of b(n), since they don t depend on that bit. The result: b(n-2) b(n-1) b(n) M(n-1) µ M(n) +1 +1 +1 M ++ (n-1) + µ(+++) = M +++ +1 +1-1 M ++ (n-1) + µ(++-) = M ++- +1-1 +1 M +- (n-1) + µ(+-+) = M +-+ +1-1 -1 M +- (n-1) + µ(+--) = M +-- -1 +1 +1 M -+ (n-1) + µ(-++) = M -++ -1 +1-1 M -+ (n-1) + µ(-+-) = M -+- -1-1 +1 M -- (n-1) + µ(--+) = M --+ -1-1 -1 M -- (n-1) + µ(---) = M --- That was the merge step combining the subproblems. Table size a measure of complexity is exponential in the number of bits that affect the measurement. 19

Not all bits remain live after processing the measurement. Bit b(n-2) has no effect on future measurements, so we can select the better of those metrics which differ only in that bit; e.g., M +++ and M -++. This gives a tentative decision; add it to the survivor path of the live bits. This reduces it to a subproblem-1 type of table b(n-1) b(n) P(n) M(n-) +1 +1 P ( n) M ( n) +1-1 P ( n) M ( n) -1 +1 P ( n) M ( n) -1-1 P ( n) M ( n) ++ + + ++ + + and the recursion step is complete. We have now looked at the temporal Viterbi Algorithm in two closely related ways, and we are ready for a step into space. 2

4. MUD in Space the CMM Algorithm Our original target was ML detection of users scattered across many cells, like this simplified macrodiversity/ microdiversity example. 4 2 b 3 a 1, a 2 1 c 5 For simplicity, assume synchronous transmissions, no echoes, so y= Cb+ n is only M antennas x K users a purely spatial problem. We would still rather not solve for b by enumeration over its 2 K possibilities. 21

22 a 1, a 2 b c 1 2 3 4 5 Again, we can obtain the overall metric by processing measurements in sequence 2 2 m m m y = y Cb cb but the gains matrix is not well structured for direct application of the Viterbi algorithm: It s time for the conditional metric merge (CMM) algorithm. C X X X X X X X X X X

Dynamic programming view: The problem of calculating the accumulated metrics M(m) up to antenna m is a combination of two subproblems: accumulated metrics M(m-1) up to antenna m-1 and the metrics µ(m) at antenna m. Continue to antenna M and it is done. An example will show how it works. 23

4 2 b 3 a 1, a 2 1 c Start with the measurement at antenna a 1. b 1 b 2 b 3 M(a 1 ) 5 + + + M +++ (a 1 ) + + - M ++- (a 1 ) + - + M +-+ (a 1 ) + - - M +-- (a 1 ) - + + M -++ (a 1 ) - + - M -+- (a 1 ) - - + M --+ (a 1 ) - - - M --- (a 1 ) All bits remain live, since they all affect the measurement at antenna a 2, at least. 24

The measurement at antenna a 2 involves exactly the same bits (microdiversity) b 1 b 2 b 3 µ(a 2 ) + + + µ +++ (a 2 ) + + - µ ++- (a 2 ) + - + µ +-+ (a 2 ) + - - µ +-- (a 2 ) - + + µ -++ (a 2 ) - + - µ -+- (a 2 ) - - + µ --+ (a 2 ) - - - µ --- (a 2 ) so they can be added directly to accumulate: b 1 b 2 b 3 M(a 2 ) + + + M +++ (a 2 ) + + - M ++- (a 2 ) + - + M +-+ (a 2 ) + - - M +-- (a 2 ) - + + M -++ (a 2 ) - + - M -+- (a 2 ) - - + M --+ (a 2 ) - - - M --- (a 2 ) Bit 3 is no longer live, so select better metric from pairs that differ in b 3 ; selected b 3 value is a survivor of that pair. 25

4 2 b 3 a 1, a 2 1 c The legacy from antenna a 2 is then b 1 b 2 M(a 2 ) + + M ++ (a 2 ) + - M +- (a 2 ) - + M -+ (a 2 ) - - M -- (a 2 ) 5 But the antenna b measurement depends on a different set of bits, so it can t be added directly. b 2 b 4 µ(b) + + µ ++ (b) + - µ +- (b) - + µ -+ (b) - - µ -- (b) Replicate both tables: legacy metrics on b 4, new metrics on b 1, since they are each independent of these respective bits. 26

4 2 b 3 a 1, a 2 1 c The result of replication is 5 b 1 b 2 b 4 M(a 2 ) µ(b) M(b) + + + M ++ (a 2 ) µ ++ (b) M +++ (b) + + - M ++ (a 2 ) µ +- (b) M ++- (b) + - + M +- (a 2 ) µ -+ (b) M +-+ (b) + - - M +- (a 2 ) µ -- (b) M +-- (b) - + + M -+ (a 2 ) µ ++ (b) M -++ (b) - + - M -+ (a 2 ) µ +- (b) M -+- (b) - - + M -- (a 2 ) µ -+ (b) M --+ (b) - - - M -- (a 2 ) µ -- (b) M --- (b) Table size exponential in number of live bits. Only b 1 remains live. For each value of b 1, choose the best metric from the four b 2, b 3 combinations, and the corresponding b 2, b 3 become survivors of that b 1. 27

4 2 b 3 a 1, a 2 1 c 5 The legacy from antenna b is just b 1 M(b) + M + (b) - M - (b) Processing of the antenna c measurement is now clear: The metric µ () c depends only on b and b. 1 5 To combine, replicate the legacy on b 5, then add the legacy and new metric for each of the four combinations. No more measurements, so neither bit remains live. Select the b 1, b 5 combination with smallest metric and release those bits, along with the corresponding survivors from b 2, b 3, b 4. 28

What do we have, in this new Conditional Metric Merge (CMM) algorithm? Like the Viterbi algorithm, it exploits sparsity and locality in the gains matrix C. It handles problems with less regular structure than does the VA. Like the VA, it is subject to exponential growth in the number of interfering bits at any measurement, but it keeps the exponent of that growth to a minimum. The actual load depends on the spatial arrangement and overlap of cells an area of continuing investigation. 29

5. MUD in Space and Time Most (but not all) systems feature echoes and lack of synchronism among users, as well as spatial interference. However, each measurement y ( n ) is affected by a small number of bits in temporal and spatial proximity. The CMM algorithm is a least-computation method of obtaining the optimum (ML) solution. m CMM reduces to Viterbi for purely temporal problems. The nightmare: having to carry around many live bits from time n-1 as we traverse the cells at time n. Possible solution: process measurements in other than strict time:antenna ordering i.e., reorder rows and columns of C to move live bits into survivors as quickly as possible. A continuing investigation. 3

5. Summary The exceptional performance of ML motivated development of an algorithm to reduce the computational load while producing a true ML solution. Conditional Metric Merge (CMM) uses dynamic programming principles to handle decision-making from loosely structured space-time measurements. Further reduction in load by appropriate sequencing of measurements is an area of further investigation. 31

Evolution of computation: N aa N ab N bb N a : # units connected to a N abc N b : # units connected to b N ac N bc N c : # units connected to c N cc Antenna a New metrics: exp 2( N a) Live entries after selection: ( N + N + N ) exp2 ab abc ac Antenna b New metrics: exp 2( N b) Table entries after combine: ( N + N ) exp2 b ac Live entries after selection: ( N + N + N ) exp2 ac abc bc Antenna c New metrics: exp 2( N c ) Table entries after combine: exp 2( N c ) Live entries after selection: 32

33