ADSL System Enhancement with Multiuser Detection

advertisement
ADSL System Enhancement with Multiuser Detection
A Thesis Presented to
The Faculty of the Division of Graduate Studies
By
Liang C. Chu
In Partial Fulfillment of the Requirements for the Degree of
Doctor of Philosophy in Electrical and Computer Engineering
School of Electrical and Computer Engineering
Georgia Institute of Technology
Atlanta Georgia 30332
July 2001
ACKNOWLEDGEMENTS
There are a number of people that should be recognized for their help and assistance
during my thesis work. First of all I want to express my sincere gratitude to my thesis
advisor professor Martin A. Brooke, who has given me the opportunity to complete my
Ph.D. study at school of Electrical and Computer Engineering in Georgia Institute of
Technology. I really appreciate the time for his advising and it is very rewarding and
inspiring to discuss questions with professor Brooke. I also want to thank professor Nikil
Jayant and professor John Copeland, who have taken an active part in advising and
guiding me in my research and education.
Furthermore, I gratefully acknowledge professor Donald L. Schilling, who always
encourages my study during these years, since I was studying in my Master’s degree with
him at the City College of New York, CUNY. Also, I would like to thank professor
Russell M. Mersereau and professor Zhong L. Wang for their supporting to serve in my
thesis committee, and all my colleagues at school of Electrical and Computer
Engineering, Georgia Tech.
Finally, and most importantly, I sincerely thank my wife, Dr. Jing Li, who help and
support me in my graduate study at Georgia Tech during these years, and deeply love and
care about me always. Also, I greatly thank my parents, Mr. Hsun C. Chu, Ms. Sai Y.
Feng, and my bother, Dr. Liang T. Chu, for their continuing care and encouragement all
the times in my life. I would like to show my great appreciation to my families for their
constant help, support and encouragement.
ii
ADSL System Enhancement with Multiuser Detection
Approved:
Dr. Martin A. Brooke, Chairman
Dr. John A. Copeland
Dr. Nikil Jayant
Date Approved
iii
Table of the Contents
Chapter One: Introduction
1
Chapter Two: Background
5
2. Problem on the DSL Spectral Compatibility with Crosstalk
5
2.1. Current Crosstalk Model and Distribution
6
2.1.1 NEXT and FEXT Modeling
8
2.1.2 Crosstalk Noise Distribution
10
2.2 Spectral Compatibility between Asymmetric and Symmetric DSL Systems
10
2.2.1 Symmetric DSL Systems
11
2.2.2 Studies on Crosstalk Noise between ADSL and SDSL
11
2.2.3 Current Deployment Plan and Proposed Enhancement
15
Chapter Three: DMT-ADSL Channel Modulation and Characteristics
16
3. Multiuser Multitone Modulation System and ADSL
16
3.1 Overview of Discrete Multitone
17
3.2. Analysis of Discrete Multitone
22
3.2.1 Channel Gap Analysis
22
3.2.2 Margin of the DMT
23
3.2.3 Performance Calculation
25
3.2.4 Bit-loading and DMT-ADSL System
26
Chapter Four: Channel Model and Multiuser Transmission
32
4.1 Twisted Wire Pairs Characteristics
32
4.1.1 Electrical Characteristics of Twisted-pair Wires
33
iv
4.1.2 Telephone Channel
35
4.2. Multiuser Transmission System
37
4.2.1 Basic on Multiuser Detection
37
4.2.2 Optimum Multiuser Detection
38
4.2.2.1 Linear Multiuser Detection in AWGA Channel
42
Chapter Five: ADSL System Enhancement
45
5.1. Multiuser Detection on DMT-ADSL System
45
5.1.1 Theoretic Bounds on DMT-ADSL Channel
49
5.1.2 Spectral Distribution on the Multiuser Channel Capacity
49
5.1.3 Examples on Capacity Bound Analysis
58
5.2. Joint Maximum-likelihood Sequence Estimation (JMLSE)
60
5.2.1 DSL Co-channel Signal Model
60
5.2.2 MLSE Receiver Design
62
5.2.3 T/2-spaced MLSE Receiver
69
5.2.4 Analyzing MLSE Receiver Structures
72
5.2.5 Reduced Complexity Receiver Structures
76
5.3.6 Joint MLSE for DMT-ADSL Receiver
78
5.3 Preliminary Performance Studies
81
Chapter Six: Low Complexity Enhancement on ADSL Receiver
85
6.1 Tone-zeroing Method
85
6.2. Low Complexity Joint MLSE
90
6.2.1 Multi-stage JVA
90
6.2.2 Multi-stage JVA with Feedback
95
v
6.2.3 Practical Enhanced ADSL Receiver
98
6.2.4 Example and Comparison
101
Chapter Seven: Performance Evaluations and Simulation Results on Enhanced ADSL
Receivers
104
7.1 Test Environment
105
7.2 Test Channel Conditions
105
7.3 Loop Characteristics
106
7.4 Capacity Improvement
107
7.5 Reach Improvement
107
7.6 Disturber Scenarios
107
7.7 Co-channel Transfer Functions
110
7.8 Simulation Results
110
Chapter Eight: Conclusions
115
Chapter Nine: Recommendations
117
Reference
119
vi
LIST OF FIGURES
Figure
Page
2.1.1 Near-end Crosstalk (NEXT)
7
2.1.2 Far-end Crosstalk (FEXT)
7
2.1.3 NEXT Power Sum Losses for 25 Pairs of PIC Cable Binder Group
9
2.2.2.1 PSD of 2B1Q SDSL at 1168, 1552 and 2320 kbps
13
2.2.2.2 Downstream ADSL Bit Rate with 1552 & 2320 kbps SDSL NEXT
14
3.1.1
Basic Multitone Modulation Transmission
18
3.1.2
Illustration of Frequency Bands for Multitone Transmission System
19
3.2.4.1 DMT Bit-Loading Concept
29
3.2.4.2 DMT-ADSL Frequency Spectrum
31
4.1.1.1 Transmission Line Segment
34
4.1.2.1 Basic Multiuser Transmission System
38
5.1.1
48
ADSL Channel Model with k-l Crosstalk Signals
5.1.2.1 TPC Attenuation Function with Difference Length
50
5.1.2.2 Channel Attenuation and NEXT Coupling Characteristic
50
5.1.2.3 Channel Capacity – Single vs. Multiuser Channels
56
5.2.1.1 Co-channel System Model
61
5.2.4.1 Basic Receiver Structure
77
5.2.4.2 Sophisticated Receiver Structure
77
5.2.4.3 Carrier Recovery in the Noise-free AWGN Channel
78
vii
5.2.5.1 Joint ML Sequence Detection between Adjacent Pair
80
5.3.1 BER for ADSL System with Single-user Detector and JMLSE
83
5.3.2
ADSL System with SDSL Crosstalk on Single-user Detector and JMLSE 84
6.1.1
Joint ML Crosstalk Signal Canceller with Tone Zeroing
87
6.1.2 Margin on DMT-ADSL with Tone-zeroing Crosstalk Noise Cancellation 88
6.2.1.1 Two-stage JVA (without Feedback Section)
92
6.2.1.2 Single-user MLSE Computational Flow Structure
94
6.2.2.1 Two-stage JVA (with Feedback Section)
95
6.2.4.1 Desired Channel Performance with Three Methods
103
7.3.1
Testing Loops
106
7.6.1
Scatter Plot of Downstream ADSL Throughput with Mixed SDSL Crosstalk 108
7.8.1 Rate-reach Curves for Test Loop #1
111
7.8.2 Rate-reach Curves for Test Loop #2
112
7.8.3 Rate-reach Curves for Test Loop #3
113
9.1
118
Channel Attenuation and NEXT Characteristic
viii
LIST OF TABLES
Table
Page
4.1.2.1
Worst-case Measurement for Telephone Channels
36
7.6.1
Disturber Scenarios
109
ix
Summary
In this thesis, a new approach on mitigating the cochannel interference (CCI), also
called crosstalk, in the Asymmetric Digital Subscriber Line (ADSL) transmission system
has been studied. This implementation ensures the spectral compatibility in the DMTADSL system together with other DSL services in a same binder cable.
The major part of this thesis concerns a modified technique for high-speed
communication over the ADSL telephone network. Discrete Multitone (DMT)-ADSL
has been standardized in American National Standards Institute (ANSI) [1]. It offers bit
rate up to 8 Mbps downstream and 1 Mbps upstream, depending on the deployment
coverage ranges. A modified method based on multiuser detection is presented herein,
which can mitigate the crosstalk interference in DMT-ADSL receiver.
An important issue for ADSL is the problem with crosstalk, which is a major threat in
ADSL receiver with other DSL services in a same binder. The performance on the
mitigation of ADSL channel crosstalk impairment is the most important criteria for
guaranteeing the Quality of Service (QoS) in an ADSL system. The essential issue of this
thesis on optimizing the ADSL system transmission throughput is to modify its channel
transceiver design. Treating an ADSL channel as a multiple-input and single-output
(MISO) system with desired ADSL signal and cochannel interference signals is just like a
multiuser communication channel model. Our modified ADSL multiuser detection can
greatly outperform the currently deployed single-user receiver with either increasing
transmission data rates, or extending deployment rages in impairment environments.
Joint Maximum Likelihood Sequence Estimation (JMLSE) gives very good performance
x
in our proposed model, but known as a computationally complex technique. The last part
of this thesis deals with low complexity multiuser detection to balance the ADSL system
performance and computational complexity with a reasonable VLSI capability, which can
be implemented in a sub-optimum solution.
With these approaches to the mitigation of ADSL impairments, the performance of
the ADSL system is greatly enhanced; for example, the ADSL service can be either
extended more than 2-kft from the current limit, or has more than 30% transmission data
rate improvement, depending on the cost requirement. Under these circumstances, the
capacity of the network is utilized to a near sub-optimum solution.
[1]Asymmetric Digital Subscriber Line (ADSL) Metallic Interface, ANSI Standard T.4131995, ANSI, New York.
xi
CHAPTER ONE
INTRODUCTION
This thesis deals with an enhancement approach on the DMT-ADSL twisted-pair
wires communication system. Our implementation ensures the spectral compatibility
between different DSL systems in a same binder cable. Therefore, the capacity of the
DMT-ADSL telephone network to support fast Internet access can be better utilized than
current solutions.
Today, an increasing number of people use the telephone access network for digital
data communication. Even if the speed of an analog modem has increased to 54 kbps, it
is still frustratingly slow for the next generation fast Internet multimedia services. Highspeed access to Internet service with various kinds of multimedia content has become an
emerging technology that is needed by all telecommunications end users. One of the best
solutions is Digital Subscriber Lines (DSL) access, which is targeted for residential users,
and has recently received much attention by many telephone companies.
The
architecture of DSL systems allows telephone companies to use existing twisted-pair
infrastructures for their next-generation broadband access networks. The sheer inertia of
the worldwide installed copper base means that it could take many years for access
networks to migrate from copper to fiber.
A combination of the existing copper
1
infrastructure and digital subscriber line transmission technologies means that a new era
of universal broadband access can now begin at a fraction of the cost and in a fraction of
the time required for optical access networks. Even with fiber optical network, the DSL
technologies will still exist in the last-mile access transmission. Over the past ten years,
DSL technologies have been developed and use larger parts of the available TCP
bandwidth. Normally, xDSL use 1 to 15 MHz bandwidth. To be able to use this large
bandwidth, the telephone lines interface in the center office (CO) and customer premise
end (CPE) need to be exchanged when employing xDSL techniques.
However, there is a serious threat to this vision of the future: a variety of impairments
in the access systems. The reason is when trying to reach higher bit rates, there is no
problem on the channel capacity of the twisted copper pair (TCP), but rather high
frequency digital signal interfaces between the lines inside a same telephone binder. As
we know that the telephone access networks were originally built for analog voice
communication, carrying voice-band signals up to 4 kHz in the frequency bandwidth and
not for digital data communication. It is relatively simple to design transmission systems
that work well in simulations and some specific laboratory tests, but more difficult to
deliver useful capacity when subjected to the hostile environment of the real network.
The uncontrolled deployment of such advanced transmission systems in multipair cables
can result in server degradation due to cochannel interference. This interference is a
linear coupling among multiple channels, also called crosstalk [1]. Even though this
problem has been studied in the past [2], [3],[4], [5], solutions for real-world DSL
services deployment are not currently available. Even low data rate implementation, such
as ISDN service, can significantly pollute the copper network. The current DSL systems
2
are modeled as single-user channel models and crosstalk is treated as white Gaussian
noise [6]. This approach is usually conservative, as the true crosstalk signal distributions
are bounded in amplitude. However, the Gaussian assumption reduces the attainable
channel capacity, but hold for the case of current practical interests [6]. It is well known
that the spectral compatibility has become a major issue for all DSL services, especially
in the transmission of symmetric and asymmetric services in the same binder group [7],
[8], [9], [10]. It is likely that as the DSL services reach significant penetration, their
crosstalk between different services will become an important factor to the success of
DSL services.
The objective of this thesis research is to understand the spectral compatibility issues
for various DSL variants [11], in order to determine a more accurate DMT-ADSL
channel model and implement with digital signal processing techniques that realize the
true broadband potential of the existing copper access network. Currently, a study [12]
has demonstrated that crosstalk effects on VDSL might be mitigated; essentially, treated
crosstalk is not exactly Gaussian. The drawback of this approach is computational
complexity in realization. It is well known to us on accurate models for the case of a
single type of crosstalk, where all crosstalk signals have the same power spectral density.
The model is called the 1% worst-case crosstalk power-sum. It is described that no more
than 1% of all pairs in all binders can receiver more crosstalk than this model [13].
However, crosstalk from multiple different types of DSL services is a relatively new area
of study. In this thesis, we focus on a study of the DMT-ADSL system enhancement
coupling with the SDSL services in a same binder cable. Our studies can apply to any
cases of DSL application, where coexists asymmetric and symmetric services.
A
3
proposed multiuser channel model has been derived, and the enhancement on the DMTADSL receiver is introduced to mitigate crosstalk from the SDSL services.
Some
important simplification algorithms, such as tone zeroing [14], and multi-stage joint
maximum-likelihood detection for multiuser DMT-ADSL are derived, which can largely
reduce the multiuser DMT-ADSL receiver complexity.
Our proposed sub-optimal
approach, multi-stage JMLSE with feedback section has a reasonable computational
complexity, and also improves Signal-to-Noise-Ratio (SNR) about 8 dB at a Bit-Error
Rate (BER) of 10-7 in the DMT-ADSL channel. This enhancement gives us a core
method on either increasing signal constellation sizes of each DMT sub-channel, or
extending the deployment ranges with a fixed transmission rate, or compensating on a
poor BER channel in achieving better throughput.
In the following sections of this thesis, the origin of the spectral compatibility
problem and its current solutions are covered; a new approach technique for mitigation
on crosstalk interference is presented; and simulation procedures and results are
addressed. Finally, discussions and conclusion of this thesis are presented.
4
CHAPTER TWO
BACKGROUND
2.
Problem of DSL Spectral Compatibility with Crosstalk
Digital subscriber line technology provides transport of high-bit rate digital
information over telephone lines. High-speed digital transmission via telephone lines
requires advanced signal processing to overcome transmission impairments resulting
from crosstalk noise from the signals present on the other wires in the same binder, radio
noise, and impulse noise.
Fortunately, amateur radio signals are narrowband and
transmission methods attempt to notch the relatively few and narrow bands occupied by
this noise, which avoids the noise rather than transmitting through it. Impulse noise is
nonstationary crosstalk from temporary electromagnetic events in the vicinity of phone
lines. The effects are temporary and typically at much lower frequencies. The channelcoding algorithm in ADSL overcomes this effect [15]. As increasing number of DSL
services are deployed, the concern is that assumptions made in the design of modem
equipment for one type of service will lead to errors in another type of modem
equipment, which also share the cable. This is the crosstalk noise. Crosstalk can be the
biggest noise impairment in a twisted pair and substantially reduces DSL performance
when it cannot be circumvented.
In this thesis, we focus on the ADSL receiver
5
enhancement design to mitigate the crosstalk from the other DSL services (mainly
targeting on SDSL service). In general, this approach can be applied to any other DSL
systems, such as VDSL, with their related channel characteristics.
2.1
Current Crosstalk Model and Distribution
The primary impairment to sending digital information through the twisted-pair loop
is crosstalk noise from similar digital services of adjacent loops. In the current situation,
DSL transmission is treated as a single-user channel with crosstalk noise as loose
Gaussian distribution [6].
The crosstalk noise can be categorized into two types.
Crosstalk to a receiver from a neighboring transmitter is called near-end crosstalk
(NEXT), as shown in Fig. 2.1.1, and crosstalk to a receiver from a transmitter at the
opposite end is called far-end crosstalk (FEXT), as shown in Fig. 2.1.2.
6
Same Binder Group
Transmit
NEXT
Receive
Fig. 2.1.1: Near-end Crosstalk (NEXT)
Same Binder Group
Transmit
FEXT
Receive
Fig. 2.1.2: Far-end Crosstalk (FEXT)
7
2.1.1
NEXT and FEXT Modeling
In the case of the NEXT model, it uses Unger’s NEXT model [16], which states, as
expected, 1% worst-case power sum crosstalk as a function of frequency [17]. NEXT is
dependent on frequency as well as on the relative location of the pairs in the binder
group. Thus, to find the crosstalk noise from a contributing circuit into another twisted
pair in a 50-pair binder, the power spectral density (psd) on any line in the binder is
modeled by
Sn = (
N 6
) ⋅ 10 −13 ⋅ f 1.5 ⋅ S xtalk _ cont ( f ),
49
(2.1.1.1)
where N is the number of crosstalk-contributing circuits in the binder, Sxtalk_cont is the psd
of crosstalk-contributing circuits.
FEXT is usually characterized in terms of 1% worst-power sum loss from all signals
on other pairs in the binder group [17]. FEXT is less severe than NEXT because the
FEXT noise is attenuated by traversing the full length of the cable.
Measurement study on a number of pairwise coupling transfer functions in a 50-pair
binder cable by C. Valenti [17] has been shown in Fig. 2.1.3. There are two interesting
issues as shown in Fig. 2.1.3. First, it shows that the NEXT increases as f1.5 with
frequency, but with significant variation in coupling with frequency.
8
NEXT POWER SUM LOSS(dB)
1000 FT, 24 AWG PIC
70
60
50
40
30
20
10
0
0.1
1
10
FREQUENCY(MHz)
100
1% Case
Fig. 2.1.3: NEXT Power Sum Losses for 25 Pairs of PIC Cable Binder Group
Note: Power Sum Loss is expressed as −10 log10 ( Power Sum Transfer Function )
9
Second, at any given frequency, only few other pairs may contribute significantly to
crosstalk, but over all frequencies, many wire lines contribute randomly. As a practical
convenience, many telecommunication engineers who work on DSL, average the
coupling over many pairs. They assume that the sum of many coupling functions is
constant. Therefore, as shown in Eq. (2.1.1.1), this constant has been determined by
ANSI as (
2.1.2
N 6
) ⋅ 10 −13 in a 50-pair binder.
49
Crosstalk Noise Distribution
It has been widely used that in the time-domain, crosstalk noise at the DSL receivers
is treated as a Gaussian distribution [6]. Obviously, this statement is not true for single
crosstalk interference, because of the highly-frequency-dependent nature of the crosstalk.
When summed over all frequencies from different contributors on different lines, the
central limit theorem of statistics loosely applies to this statement. Practically, it has been
validated that this does hold for the case of practical interest [6]. The drawback of such
an analysis may strongly depend on the size error between a Gaussian distribution and its
true distribution. When background thermal noise is small, this error can actually be
large with respect to such noise.
2.2
Spectral Compatibility between Asymmetric and Symmetric DSL Systems
Determining spectral compatibility between new and existing DSL services is a
significant challenge. Recently, a number of studies have been conducted on spectral
compatibility between DSL systems [18], [19], [20], [21]. Spectral compatibility has
become a major issue for all DSL systems, especially with respect to transmission of
10
asymmetric and symmetric services in the same binder group. When DSL deployment
reaches significant penetration, crosstalk between the various DSL services will become
the dominant performance-limiting factor to QoS of DSL systems.
The spectral
compatibility of the ADSL service with the deployment of SDSL services is the main
focus of this thesis.
2.2.1 Symmetric DSL Systems
In 1996, ETSI has made the single-pair HDSL (early version of SDSL) in standard.
This service transmits a full E1 payload on a single copper pair with a variable line rate
up to 2320 kbps [22]. The technique that enables this superior performance of a singlepair SDSL service, uses the same 2B1Q modulation, (as in HDSL, and ISDN), but with a
modified maximum likelihood detection on its receiver. There is no error correction
coding in SDSL systems.
SDSL transmits the same data rate in the upstream and downstream directions and
same transmit PSD in the upstream and downstream directions. It is bi-directional and
echo-canceled system.
2B1Q SDSL transmits a 4-level baseband pulse amplitude
modulation signals. 2B1Q SDSL systems operating at different bit rates have different
transmit PSDs. More detailed information about SDSL can be found in [22], [23], [24].
2.2.2
Studies on Crosstalk Noise between ADSL and SDSL
The spectral compatibility of high-rate SDSL services with the ADSL service in the
same binder is studied herein. We focus on SDSL services interfere ADSL service,
because of the following two reasons. First, The SDAL services are high in demand for
11
the future deployment and run on a single twisted pair telephone line together with ADSL
service in a same binder. Second, the PSDs of SDSL services, shown in Fig. 2.2.2.1, are
overlapped in most areas with ADSL PSD, which is from DC to 1.104MHz.
Spectral compatibility results are calculated for same-binder NEXT with the standard
Unger 1% NEXT model. The maximum achievable bit-rate of T1.413 full-rate DMT
ADSL in the presence of NEXT from SDSL systems was calculated. The DMT tones are
separated by 4.3125 kHz, and the received SNR of each tone was calculated. The
maximum bit-rate that each tone can carry with a 6dB SNR margin was found and then
summed across all tones to get the total achievable T1.413 bit rate. The average transmit
power of downstream ADSL is -40 dBm/Hz, and the average transmit power of upstream
ADSL is -38 dBm/Hz, within the passband. T1.413 ADSL is assumed to have trellis
coding gain of 3dB and 2dB ripple, and is FDD with non-overlapping upstream and
downstream spectra. Downstream T1.413 ADSL is assumed to transmit from 160 kHz to
1104 kHz, and upstream T1.413 ADSL transmits from 26 kHz to 138 kHz. The pilot
tones carry no data. A maximum of 12 bits per Hz can be transmitted by any tone in the
T1.413 simulations here, allowing a maximum constellation size of 4096 points. ADSL
bit rates are rounded down to the nearest integer multiple of 32 kbps. Cyclic prefix
redundancy (6.66%) and a minimal 32 kbps EOC redundancy was removed before
presenting the bit rates here.
Achievable downstream ADSL bit rates in the presence of SDSL crosstalk is obtained
as a function of loop length and SDSL data transmission rates. The simulation studies
have shown that high rate, such as 1552 and 2320 kbps SDSL NEXT, largely reduces the
ADSL downstream transmission data rates below its required minimum target rate, which
12
is 6 Mbps (low bound) up to 9 kft and 1.5.Mbps (low bound) between 9 to 18 kft. The
results are shown in Fig. 2.2.2.2. It is obvious that the higher the data rate of the SDSL
transmission, the poorer the performance of the ADSL achievable rate. The degradation
of the ADSL achievable rates can also be caused by the other DSL services in a same
binder with the similar manner. Therefore, it is necessary for us to modify the ADSL
system to suppressing crosstalk noise from the SDSL services (also to the other DSL
services) to utilize its optimal capacity at reasonable cost. (Meanwhile, the preliminary
enhancement studies on the SDSL systems can be found in [25], [26].)
1168, 1552 and 2320 kbps SDSL
PSD (dBm/Hz)
-30
-40
1168 kbps
1552 kbps
-50
2320 kbps
-60
-70
-80
-90
-100
-110
0
400000
800000
1200000
1600000
2000000
Frequency (Hz)
Fig. 2.2.2.1: PSD of 2B1Q SDSL at 1168, 1552 and 2320 kbps
13
Downstream Bit Rate in kbps
DMT-ADSL System with 24-SDSL Crosstalk
8000
7000
6000
1552 kbps SDSL crosstalk
5000
4000
3000
2000
2320 kbps SDSL Crosstalk
1000
6
8
10
12
14
16
18
26-AWG Loop Length in kft
Fig. 2.2.2.2: Downstream ADSL Bit Rate with 1552 & 2320 kbps SDSL NEXT.
14
2.2.3
Current Deployment Plan and Proposed Enhancement
For the telephone companies deploying the ADSL and SDSL services in their loops,
they use a so-called loop plan, which is basically testing and estimating of their
deployment loops with limitation on the coverage and numbers of the customer
subscribers.
Therefore, the ADSL achievable rates degradation resulting from the
crosstalk can be loosely controlled with various DSL services in the same binder groups.
The drawbacks of this method are inconvenience for deployment management; limit on
the transmission data rate; not rejecting out-of-band signal (crosstalk) by receivers, and
trading off the loop coverage and subscriber numbers.
Our studies on the crosstalk characteristics show that the crosstalk channel
characteristics change very slowly over the time and can be modeled as static. Moreover,
the type of crosstalk on each line, say on ADSL service line, does not change, as there are
fixed DSL services in the same binder from the CO to CPE sides. Therefore, mitigating
the crosstalk between DSL systems, we use a technique to enhance the ADSL receiver
that “filters” the crosstalk noise. Without loss generality, this approach can be applied to
the other DSL systems as well.
15
CHAPTER THREE
DMT-ADSL CHANNEL MODULATION AND CHARACTERISTICS
3. Discrete Multitone Modulation System and ADSL
Discrete Multitone (DMT) is a common form of multicarrier modulation. It has been
introduced by IBM [27] to take advantage of digital signal processing and the FFT. It
was later refined to a very high-performance form [28], [29]. That later form is used in
the most recent multicarrier voiceband modems, such as ADSL [30]. DMT is a method
to approximate the channel complex filters by simpler operations, which are to exploit the
knowledge of the channel information matrices, tend to discrete Fourier transforms
(DFT) algorithm [31].
It is similar to orthogonal frequency division multiplexing
(OFDM), which is widely used in wireless communications systems. A DMT system
transmits data in parallel over narrowband channels. The subchannels carry a different
number of bits, depending on their SNR. A DMT system transmits data using a twodimensional QAM on each channel.
DMT-ADSL has been standardized by ANSI [15]. Herein, we only focus our study
in DMT-ADSL. We are going to have an overview on DMT system first, before landing
on the details of the DMT-ADSL system.
16
3.1
Overview of Discrete Multitone
The principle of multitone transmission is by using two or more coordinated passband
(like QAM) signals to carry a single bit stream over the communication channel. The
passband signal are independently demodulated in the receiver and then remultiplexed
into the original bit stream. The motivation for multitone is that if the bandwidth of each
the sub-channel (tone) is sufficiently narrow, then no ISI occurs on any sub-channel. The
individual passband signals may carry data equally or unequally. Usually, the passband
signals with largest channel output SNR carry a proportionately larger fraction of the
digital information.
Fig. 3.1.1 shows the simplest multitone system to understand. N QAM (or like)
modulators, along with possibly one DC/baseband PAM modulator, transmit N+1
subsymbol components X n , n = 0, 1, …, N, where N = N / 2 and N is assumed to be
even number. X 0 and X N are real one-dimensional subsymbols while X n , n = 1, 2, … ,
N-1 can be two-dimensional complex subsymbols. Each subsymbol represents one of
2 bn messages that can be transmitted on sub-channel n. The carrier frequencies for the
corresponding sub-channels are f n =
equivalent basis functions are ϕ n =
n
, where T is the symbol period. The basebandT
1
t
⋅ sinc( ) , ∀n . The entire transmitted signal can
T
T
be viewed as N+1 independent transmission sub-channels as indicated by the frequency
band of Fig. 3.1.2.
17
X0
X1
ϕ 0 (t )
e − j 2πf1t
e j 2πf1t
ϕ1 (t )
+
ϕ1 (−t )
+
real part
n(t)
.
.
.
XN-1
XN
ϕ N −1 (t )
ϕ N (t )
e
j 2πf N −1t
+
e j 2πf N t
+
+
h(t)
+
phase
split
N = 2N
ϕ 0 ( −t )
e − j 2πf N −1t
+
e − j 2π f N t
Yn = H n ⋅ X n + N n
+
Y0
Y1
.
.
.
ϕ N −1 (−t )
YN-1
YN
ϕ N ( −t )
Fig. 3.1.1 Basic Multitone Modulation Transmission
18
Input
X(f )
X0
X1
X2
...
H( f )
XN
Yn ≈ H n ⋅ X n
Y( f )
Y0
XN-1
Output
Y1
...
Y2
YN-1
Fig. 3.1.2: Illustration of Frequency Bands for Multitone Transmission System
19
The multitone-modulated signal is transmitted over an ISI/AWGN channel with the
corresponding demodulator structure also shown in Fig. 3.1.1.
First quadrature
decoupling with a phase splitter and then baseband demodulating with a matchedfilter/sampler combination separately demodulates each sub-channel. With this particular
ideal choice of basis functions, the channel output basis function ϕ p ,n ( t ) is an
orthonormal basis set. Each sub-channel may have ISI, bit as N → ∞ , this ISI vanishes.
Thus, symbol-by-symbol detection independently applied to each sub-channel
implements an overall maximum-likelihood (ML) detector. No equalizer (nor Viterbi
detector) is necessary to implement the maximum-likelihood detector with large N.
Therefore, ML detection is more easily achieved with multitone modulation on an ISI
channel than it is on a single QAM or PAM signal, the latter of which would require
sequence detection with the Viterbi algorithm for a large number of states. Equalization
is also unnecessary if the bandwidth of each tone is sufficiently narrow to make the ISI
on that sub-channel negligible.
Multitone modulation typically uses a value for N that ensures that the pulse response
of
the
ISI
channel
appears
almost
constant
at
H (n / T ) ≡ H n = H ( f )
for
| f − n / T |< 1 / 2T . In practice, this means that the symbol period T greatly exceeds the
length of the channel pulse response. The scaled matched filters simply become the
bandpass filters ϕ p ,n (t ) = ϕ n (t ) = 1 / T sinc(t / T ) ⋅ e j ( 2π / T ) nt and the sampled outputs
become
Yn ≈ H n ⋅ X n + N n
(3.1.1)
20
The accuracy of this approximation becomes increasing exact as N → ∞ . Fig. 3.1.2
illustrates the scaling of H n at the channel output on each of the sub-channels. Each subchannel scales the input X n by the pulse-response gain H n .
Each sub-channel in the multitone system carriers bn bits per symbol. The total
number of bits carried by the multitone system is then
N
b = ∑ bn
(3.1.2)
n =0
and the corresponding data rate is then
R=
N
b
= ∑ Rn
T n =0
(3.1.3)
where Rn ≡ bn / T . Thus, the aggregate data rate R is divided, possibly unequally, among
the sub-channels.
With sufficiently larger N , an optimum ML detector is easily implemented as N+1
simple symbol-by-symbol detectors. This detector need not search all combinations of
m = 2 b possible transmit symbols. Each sub-channel is symbol-by-symbol detected.
The reason for this ML detector is so easily constructed is because of the choice of the
basis function: multitone basis functions are generically well suited to transmission over
ISI channels.
21
3.2.
Analysis of Discrete Multitone
The multitone transmission system is construed as N subchannels (tones). The most
importance is performance analysis and optimization of performance for the entire set of
subchannels.
3.2.1. Channel Gap Analysis
The probability of error for a multicarrier system is the average of the probabilities of
error on each sub-channel.
We assume that the probability of subsymbol error to be equal on all sub-channels
and to be equal to Pe / 2 = 10 −7 . We also assume that the gap Γ , is a constant value for
all the sub-channels, which is defined for any coded QAM system as
Γ = 9.8 + γ m − γ c ( dB )
(3.2.1.1)
where γ m is the margin and γ c is the coding gain.
We derive for an individual i th sub-channel that having
3Γ =
2
d min,
i
4δ i2
=
| H i |2 d i2
4δ i2
(3.2.1.2)
22
For any sub-channel, we have
bi = log 2 (1 +
SNRi
)
Γ
(3.2.1.3)
as the maximum number of bits per symbol that can be carried on that sub-channel with
margin γ m and coding gain γ c . The quantity SNRi is computed by
SNRi =
| H i |2 ε i
2δ i2
(3.2.1.4)
in this thesis, we assume that ε i = ε , a constant value on the sub-channels used and zero
on else. This is called on/off energy distribution. In practice, a better solution on the
energy distribution, which is called “water-pouring” can be found in [32]. Moreover, in a
DMT system, the sub-channels carry a different number of bits, depending on their
respective SNRi , this is referred to as a bit-loading algorithm. Several techniques on how
to perform bit-loading in a DMT system has been studied [33], [34], [35], [36] and [59].
3.2.2. Margin of the DMT
The total number of bits that is transported in one symbol is the sum of the number of
bits on each of the sub-channels, that is
N
N
i =1
i =1
b = ∑ bi = ∑ log 2 (1 +
SNRi
)
Γ
(3.2.2.1)
23
Therefore, the data rate is
R=
b
T
(3.2.2.2)
Eq. (3.2.2.1) can also be derived as
N
b = log 2 [∏ (1 +
i =1
SNRi
)]
Γ
(3.2.2.3)
We can define an average SNR as
N
SNR = Γ{[∏ (1 +
i =1
1
SNRi N
)] − 1}
Γ
(3.2.2.4)
Therefore, Eq.(3.2.1.1) can be written as
b = N ⋅ log 2 (1 +
SNR
)
Γ
(3.2.2.5)
From Eq. (3.2.2.5), it permits direct computation of a margin for a multicarrier system
with fixed data rate and probability of error. Normally, the “-1” term in Eq. (3.2.2.4) can
be ignored, and the average SNR becomes the geometric average
N
SNR ≈ [∏ ( SNRi )]
1
N
(3.2.2.6)
i −1
24
The definition of margin, γ m , for transmission on an AWGN subchannel with a given
SNR, a given number of bits per dimension b, and a given coding-scheme/target-Pe with
gap Γ is the amount by which the SNR can be reduced and still maintain a probability of
error at or below that target Pe [37].
We may compute the margin of the DMT with Eq. (3.2.2.5) as
γ m = [10 log10 (
SNR
) + γ c − 9.8]dB
b
N
(3.2.2.7)
2 −1
3.2.3. Performance Calculation
The procedure to analyze the multicarrier system is summarized in [37] as:
1. From the power budget, compute a preliminary subsymbol energy allocation
according to ε = ε i =
PT
.
N
2. Compute the sub-channel SNR’s according to
SNRi =
ε | H i |2
δ i2
(3.2.3.1)
3. Compute the number of bits that can be transmitted on each sub-channel with
given margin and given error correction code
bi = log 2 (1 +
SNRi
)
Γ
(3.2.3.2)
25
4. For those sub-channels with bi < 0.5 , reset ε i = 0 and reallocate their energy to
the other sub-channels equally. Then, we need re-compute bi .
5. Compute b by summing the bi , and then compute the maximum data rate R = b/T.
A margin can be computed using any number of used sub-channels. For data rates
considerably below theoretical optimums, the number of used sub-channels often
decreases with respect to the bandwidth used for the maximum data rate. The bandwidth
with the best margin is used for a target rate, which is lower than maximum data rate.
3.2.4
Bit-loading and DMT-ADSL System
In this subsection, we review the concept on the DMT-ADSL system characteristics.
Fig. 3.2.4.1, illustrates the concept of the bit-loading algorithm in the DMT-ADSL
system. Bit-loading is a technique that is used for multicarrier systems (DMT in this
thesis) operating on a stationary channel [33]. A stationary channel makes it possible to
measure the SNR on each subchannel and assign individual numbers of transmitted bits.
A subchannel with high SNR transmitted more bits than a subchannel with low SNR.
Fig. 3.2.4.1 shows a schematic picture of SNR and how the numbers of bits on each
subchannel vary accordingly.
When performing bit loading, one usually optimizes for either high data rate, or low
average transmitting energy, or low error probability. Typically two of these are kept in
constant, and the third parameter is the goal for the optimization. The parameter is
optimized depending on the system, its environment, and its application.
26
In a multi-system environment, where there are several DSL systems transmitting in
the same binder, the problem is complicated, since this kind of system experience
crosstalk. The level of crosstalk is proportional to the transmitting power in the systems,
as shown in Eq.(2.1.1.1). It is therefore desirable to have an equal transmission power in
all systems, to obtain equal distribution. In a multi-system environment, the average
transmitting power is usually fixed, and the optimization is for either high data rate or
low BER.
There are several techniques for bit loading in DMT systems and some of these are
described [33], [38], [39], [40]. As mentioned earlier, there are several parameters that
one can optimize for. Most algorithms optimize for high data rate or low BER.
Given a certain data rate and energy constraint, the algorithm to achieve minimal
BER is to assign one bit at a time to the subchannels. The algorithm calculates the
energy cost to send one bit more on each subchannel. The subchannel with smallest
energy cost then assigned the bit. This procedure is repeated until a desired bit rate is
obtained. In [38], it has shown that complexity of this algorithm is proportional to the
number of subchannels and the number of bits transmitted in a DMT frame. It also
suggests a suboptimal algorithm of low complexity.
An algorithm that maintains an equal bit-error probability over all subchannels, given
a data rate and an energy constraint, is presented in [39].
A suboptimal way of performing bit loading to achieve a high data rate, while
maintaining a constant BER across all subchannels is shown in [40]. In this algorithm,
the bit-loading are calculated by
27
bk = log 2 (
3E k g k γ d
+ 1) − log 2 C
2 Kδ k2
(3.2.4.1)
where bk is the number of bits carried on subcarrier k, Ek is the average symbol
transmission energy, gk is the channel attenuation, and δ k2 is the noise variance. The
coding gain is denoted γ d and the constellation expansion factor, due to coding is
denoted C. To obtain a desired symbol error rate of Pe, the design constant K is chosen to
K = [Q −1 (
Pe 2
)]
Ne
(3.2.4.2)
where Ne is the number of nearest neighbors.
Expression Eq. (3.2.4.1) can be viewed as the union bound for a QAM constellation,
with some modification for coding, where K is the SNR required obtaining an error
probability Pe. The channel SNR,
3E k g k γ d
, is divided by the SNR required to transmit
2 Kδ k2
one bit. The number of bits needed in the coding, log2C is subtracted to get the number
of bits carried by subchannel k.
Finally, to handle the situation where the numbers of transmitting systems vary one
can either do the bit loading for a worst case or employ adaptive bit loading. In [38], it
has presented such an adaptive algorithm, which called bit-swap algorithm, designed for
the case when a fixed data rate is specified. For detailed information on the bit-loading
for DMT-ADSL system, it can be found in [41], [42].
28
The ANSI T1.413 and ITU g.dmt ADSL system are standardized in the DMT system
[15]. The standards of the characteristic of the DMT-ADSL system are addressed in the
rest of the section.
Bits/channel
Attenuation
AM
Crosstalk
Frequency
Frequency
Frequency
Fig. 3.2.4.1: DMT Bit-Loading Concept.
29
As shown in Fig. 3.2.4.2, the DMT-ADSL system has two traffic channels. One is
downstream transmission, which signals from CO to CPEs side; the revised traffic is
called upstream transmission. They occupy different bandwidths. In a downstream
transmission, the system employs a sampling rate of 2.208 MHz, a block size of 512
(FFT) with conjugate symmetry, meaning 256 tones (subchannels) from 0 to 1.104MHz.
The actual downstream symbol rate is 4 kHz and the width of a tone is 4.3125 kHz. The
average downstream psd is –40 dBm/Hz. The upstream transmission employs a sampling
rate of 276 kHz, a block size 64, with conjugate symmetry, meaning 32 tones from 0 to
138 kHz. The symbol rate for the upstream transmission is 4 kHz and the width of the
tone remains 4.3125 kHz. The average upstream psd is –38 dBm/Hz. The detailed state
of the DMT-ADSL system can be found in [15], [43].
30
# of Bits
Upstream Channel
Downstream Channel
14
POTS
Frequency in kHz
0
4
30
138
240
1104
Fig. 3.2.4.2: DMT-ADSL Frequency Spectrum
31
CHAPTER FOUR
CHANNEL MODEL AND MULTIUSER TRANSMISSION
The investigation of crosstalk testing results [17], in Fig. 3, shows that the crosstalk
coupling function generally increases as f1.5 with frequency, but with significant (about
10 to 20 dB) variation in coupling with frequency. At any given frequency, only a few
other pairs may contribute significantly to crosstalk. Over all frequencies range, many
lines contribute crosstalk affect. Plus, the crosstalk psd is significantly high than the
background psd of AWGN. Otherwise, the crosstalk would not dominate the effect on
DSLs. With these conditions, we propose multiuser detection [44] for the DMT-ADSL
receiver that significantly outperforms the single-user detection, which treats crosstalk as
a Gaussian distribution. In the following section 4 and 5, we derive the twisted-pair
channel model and introduce the multiuser transmission systems.
4.1 Twisted Wire Pairs Characteristics
Twisted wire pairs are the dominating cable type in telephone access networks that
are built for point-to-point two-way communication. The copper wire pair does not
change its physical behavior significantly with time and is considered a stationary
channel [55]. This makes it possible to use a technique called bit loading [33], as shown
in section 3.2.4. for DMT transmission system, which also makes good use of the
32
spectrally shaped channel. Since DMT with bit loading makes efficient use of available
bandwidth, it has become a good candidate for DSL systems.
The characteristics of the wire pair channel have been studied in number of the papers
[45], [55], [11]. In this thesis, twisted pair cable transfer function is derived from lab
measurements using an HP 89410A spectrum analyzer. The transfer function can be
modeled as
att
H (d , f ) = 10 10 ⋅ e −
RCf d
(4.1.1)
where d is the cable length, att is the maximum attenuation, and RC is the cable constant.
The corresponding impulse response is given by
 att
 10
h(d , t ) = 10
 0

RC
e
4πt 3
− RCd 2
4t
t>0
(4.1.2)
t<0
This model is often used when DSL systems are analyzed [54], [46].
As DSL services carry on the telephone network, we discuss the characteristics of the
telephone channel in the following subsection.
4.1.1 Electrical Characteristics of Twisted-pair Wires
The details of twisted-pair wire line electrical characteristics can be found in [47] and
[48]. According to standard transmission line theory, a wire line can be thought of as a
succession of many small sections of the kind shown in Fig. 4.1.1. The inductance and
33
capacitance of the line section are given in L and C per unit length, and the line
dissipation losses are R1 ohms per unit length down the line and R2 ohms per unit length
across the line. For any sections, the characteristic impendence, defined as the ratio of
voltage to current, is
Z0 =
R1 + jωL
R2 + jωL
and ω = 2πf
(4.1.1.1)
I
R1 dy
L dy
+
R2 dy
C dy
V
_
dy
Fig. 4.1.1.1: Transmission Line Segment
Another wire line parameter, called propagation constant is defined as
γ = ( R1 + jωL)( R2 + jωC )
(4.1.1.2)
34
If a voltage V ( jω ) or a current I ( jω ) enters the telephone line, it can be decayed
along the line as V ( jω ) exp( −γy ) or I ( jω ) exp( −γy ) . In particular, amplitudes decay as
e ( −αy ) , where α is the real part of γ , called the attenuation constant. Normally, it is
expressed as
20αy log10 e
(dB/length)
(4.1.1.3)
The wave velocity along the line is ω / β , where β is the imaginary part of γ .
We need stress that all these parameters depend on the frequency. In particular R is
approximately
4.1.2
f , because of the skin effect in conductors.
Telephone Channel
The telephone is an analog medium with a certain character, roughly speaking as a
linear channel with a voice passband of 300 to 3300 Hz initially. There are many kinds
of actual physical telephone channels, due to several telephone network connections in
the world. In fact, it is necessary to define the telephone channel statistically, because no
fixed definition is practical. Extensive studies of the telephone network have been made
in different parts of the world. In North America, the telephone channel has been studied
in [49], and [50]. In Table 4.1.2.1, we summarize some of its main conclusions.
35
Table 4.1.2.1
Worst-case Measurement for Telephone Channels
Attenuation, end to end, at 1 kHz
27 dB
SNR, with special weighting
20 dB
Frequency offset
3 Hz
Peak-to-peak phase jitter, 20-300 Hz
13o
Phase jumps greater than 20o
1/per minute
Noise impulses, 4 dB below mean signal or 4/per minute
higher
Delay
50 ms
Different wire line definitions need be pointed out here for a better understanding on
the telephone loops. The term on leased line refers to a connection that is permanently
allocated to a customer, rather than dialed at each use. A connection is entirely within a
local switching area, called central office, has a much better behavior than a toll wire line,
called a local loop. In a local loop, sometimes, there are a simple wire pair and have
quite a wide bandwidth.
The sources of noise in the telephone channel are digital quantization noise, thermal
noise in detectors, crosstalk between adjacent lines, impulse, etc. Both thermal and
quantization noise can be viewed as a Gaussian noise. Therefore, the telephone channel
is normally treated as a Gaussian channel.
36
4.2
Multiuser Transmission System
The fundamental limit of multiuser detection is to mitigate the interference among
different modulated signals, called crosstalk. We focus our study in telephone cables.
4.2.1 Basic on Multiuser Detection
The basic model for a multiuser channel and transmission system is shown in Fig.
4.2.1.1, where L different data symbols, xl, l = 1, 2,…,L, share a channel with joint
probability distribution p Y . The channel input can be considered to be one large vector
X
L
X of dimension N x = ∑ N x ,l and the output vector is of dimension N. The set of users
l =1
can be viewed as a single user with a larger signal set and a corresponding larger number
of possible messages to be transmitted. Optimum detection of the entire set will be
addressed in the late of this section. However, a receiver observing Y may not desire all
the messages, and likely is attempting to attempting to detect messages from one user.
In the most general form, the multiuser channel is described by the conditional
probability distribution p X . Normally, many channels fit in the linear AWGN model,
Y
that is
Y = HX + N
(4.2.1.1)
where N is a vector of uncorrelated additive Gaussian noise values that each have
variance
No
per dimension.
2
37
x1
X
x2
xL
.
.
.
multiuser
channel
pY
Y
X
Fig. 4.1.2.1: Basic Multiuser Transmission System
4.2.2 Optimum Multiuser Detection
The optimum detector for a multiuser channel is a generalization form of the
optimum single-user channel detector. The set of all possible multiuser channel inputs
will be denoted CX, and contain M =| C X | possible distinct N-dimensional symbols,
which may be a large number that typically grows exponentially with L, the number of
users. CX is a signal constellation, equivalently a code, for the set of all users. The
details of the optimum multiuser detection have been addressed in [52], and [51]. We
review some topics related to our research works.
38
Theorem 4.2.2.1 (Optimum Multiuser Detection) The Probability of multiuser
ˆ ∈ C to maximize p and is
symbol error is minimum when the detector selects X
X
X
Y
known as the maximum a posteriori multiuser detector. When all possible multipleuser input symbol values are equally likely, this optimum detector simplifies to
ˆ ∈ C , and is
maximization of the conditional probability p X over the choice for X
X
Y
called the maximum likelihood multiuser detector [51].
The probability of error for such a system reflects the likelihood that any of the users
may been incorrectly detected
M
Pe = 1 − Pc = 1 − ∑ Pc / i ⋅ p i
(4.2.2.1)
i =1
where Pc/i is the probability that the ith possible multiuser message set is correctly
received.
The users are often modeled as being independent in their choice of transmit message so
that
L
PX = ∏ PX (l )
(4.2.2.2)
l =1
A MAP decoder simplifies to a ML decoder, when each of the users is distributed
uniformly and independently.
39
The ML decoder for the AWGN channel has a probability of error that is
Pe ≤ N e Q(
d min
)
2δ
(4.2.2.3)
where the number of nearest neighbors, Ne, now includes all mutiuser-symbol values in
the calculation and similarly the minimum distance is over the entire set of all multiuser
symbol values.
The co-channel interference in multiuser channel is defined in the
following [51].
Definition 4.2.2.1 (Co-channel Interference Free Channel) A co-channel
interference free multiuser channel (IFC) has a conditional probability distribution
that satisfies
L
p Y = ∏ p y l / xl
X
(4.2.2.4)
l =1
This is the channel probability distribution factor into independent terms for each of
the users. When the channel is not IFC, it is called co-channel interference (CCI)
channel.
With this definition, a lemma trivially follows
40
Theorem 4.2.2.2 (Independent Detection (ID)) The optimum decoder for the IFC is
equivalent to a set of independent optimum decoders for each individual user.
Independent detection means that we can use a separate receiver for each user,
potentially then enormously simplifying the detector implementation. Such systems are
the norm in early multiuser transmission designs, but the assumption of an IFC may not
be true especially when users are not well coordinated or channels are not completely
known during design.
The probability of being correct on the IFC channel is
L
Pe = 1 − ∏ Pc ,l
(4.2.2.5)
l =1
from which one notes that the overall probability of error can never be less than the
probability of error for any one of the users
Pe ≥ Pe ,l
∀l
(4.2.2.6)
a result that also holds true for any multiuser channel, ID or not because maximization of
the probability distribution Pxl / Y is the minimum-probability of error detector for the
symbol xl given the observation Y.
The individual user probability distribution can be computed directly from the overall
conditional distribution according to
41
Pxl / Y = ∫
X / xl
PX d ( X / xl )
(4.2.2.7)
Y
where the integral for any specific value of xl is simply the set of values for X/xl with xl
held constant at the specific value, and it can be computed from known quantities, such
as
PY ⋅ PX
PX =
Y
X
(4.2.2.8)
PY
Equivalently, the individual ML detector for xl given Y uses this distribution
PY / xl =
∫
PY ⋅ PX / x l ⋅ d ( X / x l )
X / xl
(4.2.2.9)
X
Next, we will review the linear multiuser detection with AWGN channel [51], [52],
which is the communication channel for the telephone transmission system.
4.2.2.1 Linear Multiuser Detection in AWGN Channel
The linear multiuser AWGN channel has been described in Eq. (4.2.1.1) as
Y = HX + N
(4.2.1.1)
42
In this channel, when desired input xl = 0 on the set of values for X/xl, in this case, the
channel output contains all the contributions from the other users, except xl.
The
probability of error is as in Eq. (4.2.2.3), when all the other users are simultaneously
detected.
For detection of desired input user xl, it may be that the overall minimum distance is
too small. That is a single fixed value for xl may corresponding to the two multiuser
codewords that determine the overall dmin. This can be defined as,
d min,l =
min
X ≠ X ' ∧ xl ≠ xl'
H (X − X ' )
(4.2.2.1.1)
It is easy to see that,
d min, l ≥ d min
(4.2.2.1.2)
with the equality if and only if any codewords in CX corresponding to the overall dmin also
corresponding to different values for the lth desired users symbol contribution. That has,
min d min,l = d min
l
(4.2.2.1.3)
This illustrates how it is possible for a detector extracting a single user to have better
performance on one that extracts all other users. However, there is always at least one
user that has a d min, l that is no longer than the dmin of the overall detector.
43
Symbol sequences can be handled as the following
Y ( D ) = H ( D ) X( D ) + N ( D )
(4.2.2.1.4)
where all the vector or matrix D-transforms are defined by sampling finding the D
transform of each element and D corresponding to a delay of a symbol period.
44
CHAPTER FIVE
ADSL SYSTEM ENHANCEMENT
5.1
Multiuser Detection on DMT-ADSL System
Last section, we reviewed the concept of multiuser detection [51], [52], where
optimum linear detectors and structures for telephone transmission channel has been
investigated. This method is very successfully used in the wireless network to combat
cochannel signals with employing frequency reuse where one or more secondary signals
from nearby cells can interfere with the desired signal. It has also been studied in the
VDSL system; together with the Home-Phone LANs (HPL) [53] and showing very little
degradation from the HPL crosstalk with multiuser detection, while large degradation
with a single-user detector.
This thesis employs multiuser detection for the DMT-ADSL system to mitigate
crosstalk from SDSL systems in the same binder. The goal of this thesis is to apply this
approach and algorithm to all DSL systems to suppress crosstalk between their services
in the same binder. The ADSL multi-access channel model can be derived in Fig. 5.1.1,
in a binder group with k pairs of wire lines. The transmitted ADSL signals are denoted as
x1 and the crosstalk data signals are xk, where K = 2,3,…,k, (can be various DSL signals in
this proposal assuming all with the SDSL). The ADSL channel transfer function is
45
represented as Hc(f), and the attenuation characteristic of the ADSL channel is
approximated by
| H c ( f ) | 2 = e −α
where α = m
f
,
(5.1.1)
l
, l = length of the channel in fleet, l0 = a reference length, f in kHz, and m
l0
= a constant of the physical channel = 1.158, as in Ref. [54]. The spectral distribution of
the NEXT interference coupling to the ADSL line channel is as in Eq. (5.1.1). A key
issue, which differs from the Gaussian model, is that each crosstalking data signal
undergoes filtering by a crosstalk coupling function before effectively being added at the
channel output to the AWGN. With multiuser detection, our proposal will ensure the
performance of telephone systems employing the ADSL loops in the presence of the
SDSL crosstalk.
At the receiver side, the received output is then
K
r (i ) = ∑ hk (i ) ∗ x k (i ) + n(i )
(5.1.2)
k =1
where xk is the transmitted signals, hk is the channel impulse response when k=1, and
together with crosstalk coupling function when k>1, n is AWGN, and K-1 is the total
number of the crosstalk signals in a binder.
The best detector for the multiuser channel is a joint maximum-likelihood detector.
This kind of detector is complex, but theoretically provides bounding of improvement
46
from a multiuser detector. Based on ADSL and SDSL environment studies, a suboptimal solution has been introduced to reduce the computational complexity.
47
x
Transmit1 (x1)
Noise, σ
2
R
ADSL Channel
+
ADSL Receiver
y
Transmit2 (x2)
Transmitk (xk)
Crosstalk Filtering
+
Crosstalk Filtering
Fig. 5.1.1: ADSL Channel Model with k-1 Crosstalk Signals
48
5.1.1
Theoretic Bounds on Multiuser DMT-ADSL Channel
The maximum possible capacities for the individual users in multiuser transmission
system help provide bounds and goals that guide the design. We have investigated a
sophisticated and more convincing theoretic argument on the achievable performance
bounds by using the multiuse DMT-ADSL channel with the SDSL crosstalk noise. It
shows that data rate of the DMT-ADSL system, which is modeled as a multiuser channel
together with the SDSL crosstalk, is higher than the data rate as the single-user channel
that modeled the crosstalk as Gaussian noise with the same PSD. The later Gaussian
modeling is what is being used today in projections that the SDSL crosstalk defeats the
DMT-ADSL transmission, but is grossly pessimistic inaccurately modeling the SDSL
crosstalk
5.1.2
Spectral Distribution on the Multiuser Channel Capacity
The spectral distribution in twisted pair channels is not distributed linearly within the
width of the frequency band. The reason is that the signal amplitude attenuates as the
frequency and loop length increase, and thus for the voice band, the useful spectrum of
the TPC is located at low frequencies, as discussed in [55]. Fig. 5.1.2.1 shows a typical
TPC attenuation characteristic at low frequencies, which is from DC to 3300Hz with the
difference measurement point from the center office (CO). Fig. 5.1.2.2 shows a typical
attenuation characteristic of a TPC, which is up to 1500 kHz, and also shows the NEXT
attenuation (or the channel transfer function) from low frequencies to high frequencies.
49
0
TPC Attenuation in dB
60 0 fe et from CO
-50
60 00 feet from CO
-100
-150
-200
-250
18 000 fee t fro m CO
-300
0
500
1000
1500
2000
2500
3000
3500
Frequency in Hz
Fig. 5.1.2.1: TPC Attenuation Function with Difference Length
0
-10
-20
analytic channel model, in Eq.(2)
Gain in dB
-30
-40
-50
squared crosstalk coupling function
-60
-70
-80
-90
0
500
1000
1500
Frequency in kHz
Fig.5.1.2.2: Channel Attenuation and NEXT Coupling Characteristic
50
Based on Fig. 5.1.2.2, we can see that at higher frequencies, there is higher attenuation
and higher NEXT crosstalk coupling, which results in smaller the SNR and the channel
capacity per unit spectrum decreases in TPC. We derive these issues in the following and
also address a comparison on channel capacity performance with our multiuser channel
model to current single-user channel, treating crosstalk as Gaussian distribution.
For the DMT-ADSL system shown in Fig.5.1.1, basic information theory can be used
to determine a maximum data rate between the set of channel inputs containing desired
DMT-ADSL signal and crosstalk signals, {x: (x1, x2,…,xk)} and the channel output y,
which is called mutual information [56]. This mutual information can be represented as
I ( x; y ) = H ( x ) − H ( x / y )
(5.1.2.1)
where H(x) is called the entropy of the source x and defined as
k
H (x) = −∑ p ( x i ) log 2 p ( x i ) (bits/outcome)
(5.1.2.2)
i =1
and H(x/y) is called the conditional entropy of x, which defined as
H (x / y ) = −∑ p ( x / y ) log 2 p ( x / y )
(5.1.2.3)
x
The mutual information can be viewed as the reduction in the uncertainty in x, on the
average, if y is known. Hence, the mutual information is a function of the crosstalk
signal contributions, which are often given and not necessarily alterable by optimization,
51
for example using a coding scheme. Therefore, the Shannon’s paper [58] is an assertion
of the channel capacity on our study. Shannon asserted that there was a largest measure
of information that a given noisy channel can carry with vanishing small error
probability; it is called the channel capacity, which is
C = max I ( X , O)
p( X )
(bits/channel used)
(5.1.2.4)
Therefore, C is the largest possible mutual information between the input source, X,
and the output O. The capacity, C is the largest measure of information that can be
learned about X through this channel. In the following, we derive the capacity for the
conventional single-user and our proposed multiuser ADSL channel models.
Fig. 5.1.2.2 illustrates the channel transfer function, and NEXT coupling transfer
function, denoted by H c ( f ) , and H NEXT ( f ) , respectively. We assume that the channel
can be characterized as a linear time-invariant system. In DMT system, we can divide
the transmission bandwidth B of the channel onto K narrow frequency sub-channels
(bins); each of width W Hz and assume that the channel, noise and the crosstalk
characteristic vary slowly enough with frequency that they can be approximated as
constant over each bin.
In the conventional single-user ADSL receiver, it is a fact that at higher frequencies,
there is higher attenuation and higher NEXT results in smaller the SNR and the channel
capacity per unit spectrum decreases.
The reason is we sum all the crosstalk
interferences and background noise (Gaussian distribution) to get the total Gaussian
noise. Consider the case of two neighboring lines carrying an ADSL service (desired
52
channel) and a SDSL service (crosstalk channel), under the Gaussian channel
assumption, we can write the single-user ADSL receiver capacity as
∞
Csin gle−user
| H c ( f ) |2 Pdesired ( f )
= sup ∫ log 2 [1 +
]df
N o ( f ) + | H NEXT ( f ) |2 Pint erference ( f )
Pdesired , Pint erference 0
(5.1.2.5)
The supermum is taken over all possible Pdesired ( f ) and Pint erference ( f ) satisfying:
Pdesired ( f ) ≥ 0, Pint erference ( f ) ≥ 0,
∀f
(5.1.2.6)
and the average power constraints for the two directions
∞
∞
0
0
2 ∫ P desired ( f )df ≤ Pdesired _ max , 2 ∫ Pint erference ( f )df ≤ Pint erference _ max
(5.1.2.7)
The denominator of Eq. (5.1.2.5) is dominated usually by the lager NEXT,
| H NEXT ( f ) |2 Pint erference ( f ) . This NEXT is much lager than background noise, which
usually in –140 dBm/Hz.
In our enhanced multiuser ADSL receiver shown in Fig. 5.1.1, we use a joint ML
detector, which is the best detector for the optimal solution. The objective of the JMLSE
is based on the single output available in a single ADSL, it selects over all possible
crosstalk channel inputs and main desired channel inputs (herein, as ADSL channel
inputs) that particular set of input, which minimizes the distance from the received single
53
channel output. In another word, JMLSE decode the desired vector x1 , and possible the
interfering signal vectors x K = x 2 ,..., x k , based on received signal R.
The signal
component H K ⋅ x K is treated as an interfering signal matrix, which prevents the
decoding of the desired signal x1 .
Rather than treating this interfering signal as a
background Gaussian noise, the JMLSE can significantly improve performance by jointly
detecting the desired signal vector x1 with crosstalk signals. Thus, we can write the
ADSL channel capacity as
∞
Cmultiuser
| H c ( f ) |2 Pdesired ( f )
= sup ∫ log 2 [1 +
]df
No ( f )
Pdesired 0
(5.1.2.8)
Obviously, we can conclude that Eq. (5.1.2.8) has much higher throughput that Eq.
(5.1.2.5).
Shown in Fig. 5.1.1, multi-user access channel capacity considers the problem where the
received signal Y consists of a superposition of signals X i , received with power Pi and
bandwidth B , in the presence of additive white Gaussian noise N with sample power n
Y = ∑ Xi + N
(5.1.2.9)
i
As an example, consider the two user case, Y = X 1 + X 2 + N , and assume without loss of
generality that is X 1 the signal of interest and X 2 is an interfere.
An intuitively
straightforward way to deal with this case is to think of X 2 as another noise term and
54
lump it into N. This "single user" approach does not take advantage of the structure of the
interfering term and results in a significant penalty in the achievable capacity. It can be
shown [56], and [57]) that in this case the achievable capacity for user 1 is

P1 
C1* = B log1 +

 P2 + nB 
(5.1.2.10)
and similarly for user 2

P2 
C 2* = B log1 +

 P1 + nB 
(5.1.2.11)
In Figure 4 below, the achievable capacity region is depicted in the square formed by the
dotted lines. If however, X 1 and X 2 are considered jointly, then the achievable capacity
is given by
P 

 P + P2 
Ri ≤ B log 1 + i  , R1 + R2 ≤ B log 1 + 1
nB 
 nB 

(5.1.2.12)
which is depicted in Figure 5.1.2.3 below by convex hull formed by the solid lines.
Notice the considerable capacity improvement when the interference structure is taken
into account.
55
P 

C i = B log 1 + i 
 nB 
(5.1.2.13)
Rate
(User 1)
C1
Multiuser
C1*
Single
User
Rate
(User 2)
C2*
C2
Figure 5.1.2.3: Channel Capacity – Single vs. Multiuser Channels
An alternate, we can derive the same conclusion of a better performance in
multiuser DMT-ADSL model using [14]. As shown in Fig. 5.1.1, the signal y represents
the sum of all the data signals and R is the signal at the ADSL receiver. The mutual
information I(x, y) cannot exceed the mutual information between the aggregate data
signal R and the channel output y, I(R, y) [58] ,[59]. Also, if each user has data rate Ri, i
= 1,2,…K, then we have
56
L
`
∑R
i =1
i
≤ I ( X, R )
(5.1.2.14)
Now, we start with: I ( x, y ) ≤ I ( R , y ) , with equality if x ↔ R is a one-to-one
mapping. The mapping is one-to-one in all but degenerate cases when the discrete
distribution of x is considered. The case of the mapping being close to singular, not oneto-one, is accommodated tacitly in the following analysis by the assumption attached to
the level of the power spectral density of the AWGN that is added to R from y. This later
mutual information is between a single channel input and a signal channel output and is
easily computed for an ADSL channel. The number attached to I(R, y) strongly depends
on the level of AWGN, which does not include crosstalk signal impairments. This level
can be very low for an ADSL and is often determined by receiver thermal noise or
analog-to-digital converter quantization levels, which are often controllable by design.
Any larger noise is likely to be crosstalk, and it spans a substantial bandwidth. If it is a
crosstalk signal, then this proposal will distinguish it from the noise.
Computing the mutual information I(R, y) for an ADSL system is straightforward.
This number will be high, often an order of magnitude more or higher than data rates
normally projected for an ADSL. This large value is because the AWGN is small
compared with the crosstalk signals.
The achievable data rate for the desired channel, i =1, is then bounded by the
achievable limit [60]
K
R1 ≤ I ( R, y ) − ∑ I ( xi , y ).
(5.1.2.15)
i=2
57
The limit in Eq. (5.2.1.10) can be a much larger number than the data rate based on
Gaussian crosstalk assumptions. The sum of data rates subtracted on the right can be a
much smaller number than might be initially computed by summing the data rates of all
crosstalk signals. The smaller number will occur because of the frequency-selective
crosstalk coupling function in Fig. 5.1.1 The effective data rate or information of a highly
bandlimited random process is essentially zero when its power spectral density is less
than the AWGN level [61].
5.1.3
Examples on Capacity Bound Analysis
As an example, assume that we are interested in the pairwise crosstalk interference from
an adjacent neighboring the SDSL has psd of –38dBm/Hz to the desired DMT-ADSL
system. Each DMT-ADSL tone has a bandwidth of 4.3125 kHz. The center frequency of
the downstream DMT-ADSL is 690 kHz. The SDSL crosstalk coupling function to the
ADSL channel can be calculated with 10-9f1.5 [54].
A psd of –38 dBm/Hz SDSL
transmitted energy will have a psd of –86.8 dBm/Hz at the ADSL receiver. As we know,
the background white noise is –140 dBm/Hz in the commonly used case. The mutual
information of a SDSL crosstalk on the ADSL circuit line is
I ( x 2 , y ) = BW each _ tone log 2 (1 + 10 ( psd _ awgn − psd _ coupling _ signal ) / 10 )
= 4.3125kHz log 2 (1 + 1014 −8.68 ) = 78.5kbps.
This means, it is possible to sufficiently detect a 1552 kbps SDSL signal with 20 tones in
the worst case with the right code. Moreover, though it is a pairwise result, this capacity
is very closed to an ADSL line in a binder group with many wire lines together, because
58
our study [62] has also shown that the major dominant effect of the crosstalk is from an
adjacent neighboring pair DSL service in the same binder group.
Therefore, -86.8
dBm/Hz is quite closed to the total 50-pair crosstalk degradation in the binder, but only 2
or 3 dBm worse than that [62].
Assume that a maximum instantaneous data rate of 2320 kbps SDSL signal is coupling
with an ADSL system; thus, the maximum mutual information from the SDSL signal into
the ADSL line is limited to 2320 kbps. An ADSL signal has an average attenuation of
about 43 dB in its downstream bandwidth, with psd of –40dB/Hz. Therefore, it should
have a residual capacity of
I ( x1 , y ) = I ( R, y ) − 2320kbps
= 1.104 MHz log 2 (1 + 10[ − ( 40 + 43) −( −140 )] / 10 ) = 21Mbps.
In theoretic bound, there is enough room for the ADSL signal to transmit much faster
than the current limit. Though additional SDSL and other DSL signals would reduce this
21 Mbps rate a bit, it will always be possible to detect the ADSL signal even with some
large impractical interference signal levels, which may never exist in DSL line channel.
Finally, if the SDSL crosstalk coupling were modeled as a white Gaussian noise with the
same psd, the ADSL data rate then becomes
R ADSL = 1.104 MHz log 2 (1 + 10 8.68−8 ) = 330kbps,
59
which is almost a complete loss. Therefore, it is too pessimistic to model the crosstalk as
a white Gaussian noise, as currently used.
5.2
Joint Maximum-likelihood Sequence Estimation (JMLSE)
This technique is based on maximum-likelihood sequence estimation (MLSE) [63],
[64]. Since the cochannel signals are jointly recovered, this kind of method is referred to
as joint maximum-likelihood estimation (JMLSE) [65].
5.2.1
DSL Co-channel Signal Model
A general multi-access UTP channel model is shown in Fig.5.1.1. As our study
shows, the adjacent neighboring pair has the dominating contribution on the NEXT
interference [62]. The block of N pairs wire line channel model can be illustrated in as
Fig. 5.2.1.1. The transmitted low-pass equivalent waveforms can be represented by
x m (t ) =
∞
∑d
k = −∞
m
( k ) g (t − kT ), m = 1,2,...N
(5.2.1.1)
where T is the symbol duration, {d1(k)} is the primary source symbol and {dm(k)},m =
2,3,…,N, is interference source symbols, and g(t) is the shaping function.
DSL systems use twisted-pair copper cable as their transmission media. The
transfer function of the twisted-pair copper cable can be modeled as [66], [67]
H (d , f ) = 10
max_ atten
10
e−
RCf d
,
(5.2.1.2)
60
where d is the cable length, max_atten is the maximum attenuation, and RC is the cable
constant.
The corresponding impulse response is given by
 att
 10
h(d , t ) = 10
 0

RC
e
4πt 3
− RCd 2
4t
t>0
t<0
Primary Channel
d1(k)
d2(k)
g(t)
x1(t)
(5.2.1.3)
Ν(t)
h1(t)
+
g(t)
x2(t)
h2(t)
R
E
C
r(t)
T/2 Sampler
g(t)
dN(t)
hN(t)
xN(t)
CrosstalkChannel
Fig. 5.2.1.1: Co-channel System Model
The discrete measurement samples of the received signal r(t) at the output of the T/2spaced sampler in Fig. 8 are given by
61
N
Lm
r (kT + jT / 2) = ∑∑ hm ,n (kT + jT / 2)d m
m =1 n =0
(5.2.1.4)
+ N (kT + jT / 2), j = 0,1,..., N − 1
where the noise sequences {N(kT+jT/2)} are assumed to be independent, white and
Gaussian with zero mean and equal variance. The reasons on choosing the T / 2 -spaced
Joint MLSE are to eliminate the whitening matched filter, and also less sensitive to
sampling time offsets.
As an example on each adjacent pair line, the delay spreads of the primary and secondary
channels are L1T and L2 T . The 2( Lm + 1) channel coefficients { hm ,n (kT + jT / 2) }
represent the convolution of the frequency selective channels with the transmit filter g(t),
sampled at T/2 second. The goal for our proposed receiver is to accurately recover the
sequences {d1(k)} and {d2(k)}, given reliable estimates of the channel impulse response
h1 (k ) and h2 (k ) , where hm ( k ) = [ hm ,0 ( k ), hm ,1 ( k ),..., hm , Lm ( k )] . Here, we assume the UTP
channel is a Gaussian channel, which has mutually uncorrelated, white Gaussian
background noise, with zero mean and equal likely spectral density, δ 2 / 2 .
As the JMLSE is based on the technique of MLSE, we are going to review the MLSE
receiver in the following sub-sections.
This helps us on better understanding how
JMLSE works on ADSL receiver enhancement.
5.2.2 MLSE Receiver Design
The maximum-likelihood sequence estimator [68], [69], [70] has shown the best
performance among all the equalizers and detectors, which called an “optimal” receiver
in the communication systems.
62
The optimum receiver selects the most probable transmitted sequence, using all
available information fully. The a posteriori probability is the probability that the symbol
sequence, { α } was transmitted, given that r(t) was received, as
pα r (t ) ({α }r (t ))
(5.2.2.1)
The statistically optimum receiver computes a posteriori probabilities for all
transmitted sequences, and then chooses the sequence with the greatest a posteriori
probability. This receiver structure is called maximum a posteriori probability (MAP).
Using Bayes theorem, the a posteriori probability can be rearranged as
pα r (t ) ({α }r (t )) =
pα ,r (t ) ({α }, r (t ))
p r (t ) (r (t ))
=
p r (t ) α (r (t ){α })pα ({α })
p r (t ) (r (t ))
(5.2.2.2)
Ultimately the probability expression is used for decision-making, so the
denominator, p r (t ) (r (t )) , can be discarded, since it is common for all hypothesised
sequences. A goal of communications is maximizing the information rate, so source
coding (e.g. Huffman coding, arithmetic coding) is often employed. The symbol
sequence is approximately white, with equiprobable symbols. Accordingly, maximizing
the a posteriori probabilities is equivalent to maximizing the conditional probabilities,
p r (t ) α (r (t ){α })
(5.2.2.3)
63
for all symbol sequences. This is an MLSE structure, and is optimal when the symbols
are equiprobable. As written, the conditional probabilities are computed at the end of
transmission, whereas a recursive algorithm to compute the conditional probabilities is
preferred since transmission may never stop.
A continuous time version of the derivation in [71] is used. The transmission interval
begins at tB sec and ends at tE sec. These times may be finite or infinite. The received
signal in the ith symbol interval is defined as,
r (t )
ri (t ) = 
 0
iT ≤ t ≤ (i + 1)T
otherwise
(5.2.2.4)
The signal up to time (i+1)T is the history of ri(t)
r (t ) t B ≤ t < (i + 1)T
Ri (t ) = 
otherwise
0
(5.2.2.5)
so the conditional probability can be expanded by repeated application of Bayes theorem,
as
p r (t ) α (r (t ){α }) =
t E T 
∏p
i = t B T 
ri (t ) Ri ,α
(r (t ) R( ) , {α })
i
i −1
(5.2.2.6)
64
Since the logarithm function is one-to-one and monotonic, choosing the transmitted
sequence with maximum log-likelihood is equivalent to choosing the transmitted
sequence with maximum conditional probability. The log-likelihood is defined as
ln p r (t ) α (r (t ){α }) =
t E T 
∑ ln p
i = t B T 
ri (t ) Ri ,α
(r (t ) R , {α })
i
(5.2.2.7)
i
where the product has been reduced to a sum. The sequence with the largest loglikelihood function or metric is the maximum likelihood sequence, and it is selected by
the receiver.
The sequence of complex phases, {β}, can reconstruct the symbol
sequence, {α}, so it is sufficient for a receiver to maximize the log-likelihood over {β}
instead, where the revised metric equals
ln p r (t ) β (r (t ){β }) =
t E T 
∑ ln p
i = t B T 
ri (t ) Rir , β
(r (t ) R , {β })
i
(5.2.2.8)
i
With linear modulations, the information phase, β
k
k −1
until t = kT+ξF, so the partial sum,
∑ ln p
i = t B T 
transmitted sequence only up to β
M k − t B
T +1
(k-1).
ri (t ) Ri , β
does not arrive at the receiver
(r (t ) R , {β }),
i
i
depends on the
At the kth symbol interval, there are
distinct metrics, and in general this number grows exponentially with the
transmission duration. Thus choosing the ML sequence involves searching for the best
metric through an ever-expanding tree.
65
The kth log-likelihood, ln pri (t ) Ri , β (rk (t ) Ri , {β }) , at the kth symbol period is labeled the
branch metric. The running total of branch metrics, from t B T  to k, is labeled the path
metric. A sequence of transmitted symbols is called a path, since it defines the branches
taken through the tree.
In hardware implementations of Viterbi algorithm, the log-likelihood,
ln pri (t ) Ri , β (rk (t ) Ri , {β }) are usually converted to bit metrics as,
M (ri j | β i j ) = a[log p (ri j | β i j ) + b]
(5.2.2.9)
where a and b are chosen such that the bit metrics are small positive integers that can be
easily manipulated by digital logic circuits.
Therefore, the path metric for {β } is
computed as,
M (r | β) =
k
∑ M (r
i =[ t B / T ]
i
j
| β ij )
(5.2.2.10)
Thus, the code word {β } that maximizes p r (t )| β also maximizes M (r | β) .
"Per-Sequence-Processing" is the reason for the exponentially increasing complexity.
In the general communications problem, the optimal receiver structure has no a priori
knowledge of the channel. However, knowledge of the channel and other parameters is
necessary to compute the branch metrics, and these are progressively estimated. The
estimation is normally data-dependent, since the transmitted signal must be deconvoluted from the received signal before the channel is revealed. Thus the estimated
66
channel and the branch metric depend on the whole symbol sequence history. The
number of branch metrics increases exponentially in time.
Furthermore, the log-likelihood of equation (5.2.2.8) is difficult or impossible to
compute when all random processes are considered. The transmitter carrier oscillator, the
receiver carrier oscillator, the transmitter symbol rate oscillator and the receiver symbol
rate oscillator all introduce random phase noise. The multipath channel has a random
number of paths, with a randomly time-varying path attenuations, delays, and arrival
angles. The receiver’s motion is random. When all the individual pdfs are known, it is
mathematically prohibitive to construct the joint pdf. When the pdfs are not known, it is
impossible.
Thus the MLSE receiver structure is not implementable, except when a simple
statistical model can describe the communication system and either the transmission
interval is short or the tree search simplifies to a trellis search. Trellis searches arise
when no data-dependent quantities need to be computed and the branch metric is a
function of a finite number of code states and transmitted symbols.
One example is the transmission of uncoded data through a time-invariant channel
corrupted by white noise, when the channel, the carrier’s frequency and phase, the
symbol rate oscillator’s frequency and phase, and the beginning of transmission are
completely known [72], [73]. The received pulse shape extends over L symbol periods.
The branch metric is a function of the hypothesis vector, {β (i − L +1) , K β i }. There are only
a finite number, ML, of hypothesis vectors, which can be mapped to the ML branches of
an ML-1 state trellis. At the ith symbol period, the trellis’ state is controlled by the first L-1
symbols, {β (i − L +1) , K β (i −1) }. The last symbol, βi, specifies which of the M branches are
67
selected. There are M paths arriving at each state in the (i+1)th symbol period [72] and
[73] demonstrate that the path metric can be constructed as the sum of independent
branch metrics.
Accordingly, the exhaustive comparison required to compute the
maximum likelihood sequence can be performed iteratively, before the end of
transmission. Since a path’s metric beyond the ith symbol period is independent from its
path metric before the ith symbol period, it is sufficient for each state to retain only the
path with the best metric from the M arriving paths. Thus each symbol period, the MLSE
receiver extends ML-1 surviving paths in ML ways, one for each hypothesis vector.
Immediately, these paths are pruned back to the best ML-1 surviving paths. This is the
Viterbi algorithm [72].
Ideally, the algorithm makes no decisions until the end of
transmission ("ideal Viterbi"); however, the path histories require linearly increasing
storage, and the decisions are delayed too long.
In practice, the decision delay is
truncated to some fixed value.
Herein, we choose a fractionally spaced MLSE for enhanced DMT-ADSL receiver.
It is addressed in the following sub-section. The ideal fractionally spaced MLSE receiver
has the same performance as the conventional MLSE receiver. We derive an equivalent
receiver that does not implement the matched filter, but instead uses a fixed analog filter
that is matched to the pulse shaping filter. A noise-whitening filter having a fixed
structure that does not depend on the unknown channel is used to whiten the T/2-spaced
noise samples. A Viterbi algorithm then operates on the T/2-spaced received sequence at
the output of the noise-whitening filter.
In conclusion, we summarize the Viterbi algorithm implementation processing.
68
The Viterbi decoding process begins with building the accumulated error metric for
some number of received channel symbol pairs, and the history of what states preceded
the states at each time instant t with the smallest accumulated error metric. Once this
information is built up, the Viterbi decoder is ready to recreate the sequence of bits that
were input to the channel. The detail steps are in the following.
Accomplishment steps
(1) Select the state having the smallest accumulated error metric and save the state
number of that state.
(2) Iteratively perform the following step until the beginning of the trellis is reached:
Working backward through the state history table, for the selected state, select a new
state, which is listed in the state history table as being the predecessor to that state. Save
the state number of each selected state. This second step is called traceback.
(3) Work forward through the list of selected states saved in the previous steps. Look up
what best estimated input bit corresponds to a transition from each predecessor state to its
successor state.
5.2.3 T/2-spaced MLSE Receiver
It is known to us that the optimum receiver filter, given the received signal r(t), is a
filter matched to h(t) [72]. In Ref. [72], it showed that a matched filter followed by a
symbol-rate sampler gives sufficient statistic to estimate the transmitted sequence {βl}.
69
In conventional MLSE receiver, the T-spaced samples at the output of the matched filter
must be obtained at the correct timing phase.
The signal at the output of the matched filter is
rMF (t ) = ∑ β l x(t − kT ) + v(t )
(5.2.3.1)
l
where x(t ) = h(t ) ∗ h * (−t ) , and v(t) is the response of the receiver filter to the white noise
signal n(t).
In the receiver of Eq. (5.2.3.1), the signal rMF(t) is sampled with rate 2/T. The overall
channel impulse response and the sampler can be represented by a discrete time T/2spaced transversal filter with coefficients
x ( 2) = ( x−( 22)L , x−( 22)L+1 ,..., x−( 12) , x0( 2 ) , x1( 2) ,..., x2( 2L)−1 , x2( 2L) ) .
(5.2.3.2)
In Eq. (5.2.3.2), we assume that the samples are obtained at the correct timing phase, i.e.
xl( 2 ) = x(lT / 2) and xl( 2 ) = ( x−( 2l ) )* , where (⋅) ( 2) indicates rate 2/T sampling.
The T/2-spaced noise samples at the output of the matched filter have the autocorrelation
1
E[vm* vn ] = N 0 xn( 2−)m
2
(5.2.3.3)
The z-transform of x(2), denoted as X(2)(z), has 4L roots and can be factored as
X ( 2 ) ( z ) = V ( z )V * (1 / z * )
(5.2.3.4)
70
where V(z) and V*(1/z*) are polynomials of degree 2L having conjugate reciprocal roots.
The T/2-spaced correlated noise samples are now whitened using a filter that has a
transfer function 1/V*(1/z*). Once again, V*(1/z*) is chosen such that all its roots are
insider the unit circle. The output of the noise-whitening filter is
2L
y l( 2) = ∑ vi I l(−2i) + η l( 2)
(5.2.3.5)
i =0
where { η l( 2 ) } is a T/2-spaced white Gaussian noise sequence with variance
1
E[| η l( 2) | 2 ] = N 0 and the {vk} are the coefficients of a T/2-spaced discrete-time
2
transversal filter having a transfer function V(z).
The sequence { β ( 2) } is the
corresponding T/2-spaced symbol sequence given by
, l = 0,2,4,...
β
β l( 2) =  l / 2
l = 1,3,5,...
0 ,
(5.2.3.6)
Then, we have
2L
L
i =0
i =0
∑ | vi |2 = ∑ | g i |2 = x0( 2) = x0
(5.2.3.7)
Notice that the samples y 2l( 2) and y 2( 2l +) 1 correspond to the lth received baud where
L
y 2( 2l ) = ∑ v 2 i β l −i + η 2( 2l )
i =0
71
L
y 2( 2l +) 1 = ∑ v 2i +1 β l −i + η 2( 2l +)1
(5.2.3.8)
i =0
Note that y 2l( 2) is not necessarily equal to yk due to the fact that different noise-whitening
filter is used to whiten the T/2-spaced noise samples.
Maximum likelihood sequence estimation can be applied to the T/2-spaced received
samples in a very similar to that described in Ref. [72]. The Viterbi decoder searches for
the most likely path in the trellis based on the T/2-spaced received sequence. However,
two samples are fed to the Viterbi decoder for every baud, and a branch metric for each
transition in trellis is evaluated. For each transition into the state sl(+i )1 , the samples y 2l( 2)
and y 2( 2l +) 1 are used by the Viterbi algorithm to evaluate the following branch metric
L
γ l ( s lj → s li+1 ) =| y 2( 2l ) − v 0 β l ( s lj → s li+1 ) + ∑ v 2 m β l − m ( sl( j ) ) 2 |
m =1
L
+ | y 2( 2l +) 1 − v1 β l ( s lj → s li+1 ) + ∑ v 2 m +1 β l − m ( s l( j ) ) 2 |
m =1
(5.2.3.9)
We can easily see that T/2-spaced MLSE receiver has the same number of the states
as the conventional MLSE receiver, but required twice the number of computations.
5.2.4 Analyzing MLSE Receiver Structures
The BER of linear receiver structures is relatively straightforward to compute, since
symbols are processed independently and so their errors are independent too. However,
72
this is not the case for non-linear receiver structures, since consecutive errors are not
usually independent.
The exact BER can be computed as follows. Given a transmitted sequence, the joint
pdf of all hypothesized sequences’ path metrics is calculated.
This can be viewed
geometrically as a density function in a multidimensional space. Each hypothesized
sequence is assigned its own (positive only) axis. All the path metrics at the end of
transmission can be written as a coordinate vector, specifying a point in this
multidimensional space. The value of the density function at this point expresses the
likelihood of computing that set of path metrics.
The space can be divided into decision regions. Points within the same decision
region share the same largest path metric, and so detect the same maximum likelihood
sequence. In fact, a hypothesized sequence’s decision region encloses the points closer to
its axis than any other.
When the ML sequence is detected instead of the transmitted sequence, there are a
number of bit errors, unless the ML sequence is the transmitted sequence. This number,
divided by the total number of bits in the transmitted sequence, weights each region of
the joint pdf. Then the bit error rate due to the transmitted sequence is calculated by
repeatedly integrating over all the weighted joint pdf’s dimensions. The overall BER is
then this quantity, averaged across all transmitted sequences.
Clearly, this exact method has little value since it is difficult to compute. The number
of path metrics is increasing exponentially with the transmission length, so the jointly pdf
gets very complicated and the number of integrations gets very large.
73
Forney’s union bound technique is more straightforward to compute [72].
The
probability that the sequence with the largest path metric that is not the transmitted
sequence can be upper bounded by the probability that any error sequence has a larger
path metric than the transmitted sequence’s path metric. Thus a joint pdf is not needed,
only the pdf of the path metric difference, for all possible transmitted and error
sequences.
Furthermore, there is no need to compute the pdf over the whole transmission
interval. An error sequence follows the same states as the transmitted sequence until the
first error. Errors follow until the two sequences merge at a common state again. This
sequence of errors is called an error event. Any useful communications system has a low
BER, so the error events are normally short compared to the mean time between them.
Accordingly, they can be considered independent, so their probability can be calculated
by only considering the pdf of the path metric difference in the vicinity of the error event.
We point out some notations before our further discussions. The actual transmitted
sequence is denoted by {β
u,v
}. Potential error events are written as {β
u,v,w
}. The
superscript u denotes the length of the error event under consideration. The superscript v
enumerates each distinct transmitted sequence in the vicinity of the length u error event.
Each transmitted sequence can be confused with several others, so the error sequences are
enumerated by a further index, w. When an error occurs, the ML sequence is one of the
error sequences, {β u,v,w}.
The probability that the sequence, {β
u,v
( )
}, is transmitted is labeled by P β u ,v . The
probability that an error sequence has a better metric than the transmitted sequence (the
(
)
pairwise probability of error) is denoted by P β u ,v → β u ,v ,w . In general, the pairwise
74
probability of error depends on the correct symbols in the vicinity of the error event as
well as the actual erroneous symbols. The number of bit errors that arise from the error
(
)
event is written e β u ,v → β u ,v ,w .
An upper bound on the BER can be deduced from a union bound over all error
events. Since this is an infinite sum, it must be truncated. The truncated bound is a
credible upper bound if at least the dominant error events are considered; the bound is
tight if these error events are relatively disjoint.
Thus the BER bound is the union bound of the dominant error events, averaged
across the transmitted sequences in the vicinity of the error event,
(
)(
)(
P β u ,v P β u ,v → β u ,v , w e β u ,v → β u ,v , w
BER < ∑
log 2 M
u ,v , w
The form of an error sequence is {β
u,v,w
)
{
(5.2.4.1)
(
)
}
} = β u ,v exp jθ u ,v ,w + ε u ,v ,w , where the
sequences {ε u,v,w} and {θ u,v,w} specify the particular error sequence, and are constrained
so that {β
u,v,w
} is also an allowed sequence. For an error event extending from the ith to
the (i+u-1)th symbol period, ε ukr,v ,w is zero for k < i and for k > i+u-1. When the data is not
encoded rotationally-invariantly, θ ukr,v ,w is always zero; otherwise θ ukr,v ,w is zero for k < i+u
and it is constant for k ≥ i+u. This remaining phase offset allows the error event to end
when phase lock between transmitter and receiver is lost (cycle slip), since the
rotationally invariant code prevents further bit errors. By constraining {θ u,v,w} to be zero
75
until the end of the error event, the sequences, {ε u,v,w} and {θ u,v,w}, uniquely describe an
error event. Therefore the error sequence can be written as
{Kβ (
u ,v
i−2)
(
) }
, β (ui−,v1) , β iu ,v + ε iu ,v , w , K, β (ui +,vu −1) + ε (i +u −1) , β (ui +,vu ) exp jθ (ui +,vu, w) , K
(5.2.4.2)
5.2.5 Reduced Complexity Receiver Structures
Since the complexity of the MLSE receiver increases exponentially in time and the
necessary log-likelihood cannot easily be computed, reduced complexity systems are
employed. In a basic receiver with linear detection, carrier frequency, carrier phase,
channel estimation, channel equalization and symbol timing are acquired by separate subsystems, as in figure 5.2.5.1. The symbol-rate oscillators at transmitter and receiver are
assumed to be sufficiently precise and stable that the symbol rate is known a priori at the
receiver. The more sophisticated scheme of figure 5.2.5.2 uses a fractionally spaced
equalizer for joint carrier phase recovery, symbol timing estimation and channel
equalization. The carrier recovery structure in an AWGN telephone channel is shown in
Fig. 5.2.5.3.
76
Figure 5.2.5.1: Basic Receiver Structure
Figure 5.2.5.2: Sophisticated Receiver Structure
77
Many successful algorithms exist for each of these tasks, for the channels of our
interest, namely the AWGN channel.
Through, the performance of many of these
algorithms degrades substantially in the fast fading wireless channel, but not in the
telephone wireline DSL channel, which we study herein. Some of these difficulties can
be further studied to motivate the development of new receiver structures, explicitly
designed for the fast channels. Simple received signal models are used for illustrative
purposes, since the same or worse problems appear when more sophisticated signaling
formats and channel models are used.
Figure 5.2.5.3: Carrier Recovery an AWGN Channel
5.2.6 Joint MLSE for DMT-ADSL Receiver
Jointly ML receiver detects both desired ADSL signals as well as crosstalk data
signals, which showed in Fig.5.1.1. This technique has been proved an optimal receiver
78
for communication channels with co-channel interference in many wireless applications
[74], [75], and [76]. The principle of JMLSE on ADSL channel is by selecting over all
main desired channel inputs and all possible crosstalk interference channel inputs, that
finding a particular set of inputs that minimize the distance from the received single
channel output. We notice here that JMLSE across all the channels, which including
main channels and crosstalk channels. This detector is very complex, but theoretically
allows bounding of improvement from multiuser detectors.
The structure of the optimal JMLSE is a straightforward extension of the single
channel MLSE. As in a adjacent pair case, if L1+1 and L2+1 are the channel impulse
response lengths of the two co-channel signals, then the JMLSE selects the ith joint
symbol sequence { xik,1 , xik, 2 } that maximizes the metric
p(r k | x1k,i , x 2k,i ) ≥ p(r k | x1k, j , x 2k, j )
(5.2.6.1)
for all j ≠ i where r k = {r (k ), r (k − 1),..., r (1)} is the received sequence. The JMLSE can
be implemented using a joint Viterbi algorithm.
For the joint demodulation of two cochannel signals, the objective of JMLSE, which
can be illustrated in Fig. 5.2.6.1, is to determine the pair of sequences { xik,1 , x kj, 2 } that
minimizes the sum of squared errors defined by the error sequence eik, j . When the
channel has a finite impulse response (FIR), that Viterbi algorithm (VA) is a practical
way of implementing optimal single-user MLSE, as shown in [64]. The VA for JMLSE
is implemented in a method very similar to that of the single-channel VA. A joint state
79
S ik −1, L = [ sik,1−1, L1 , sik, 2−1, L2 ] is defined by appending the primary ( sik,1−1, L1 ) and secondary
( sik, 2−1, L2 ) states. Therefore, the received metric is equal to
( {
ln p r (t ) S k −1, L r (t ) S
i
k −1, L
i
t E T 
}) = ∑
i = t B T 
(
{
ln p r (t ) R , S k −1, L ri (t ) Ri , S ik −1, L
i
i
i
})
(5.2.6.2)
Observe that in this case, each joint state at time k-1 can have transition to M2 states at
time k and can be reached by the same number of states from time k-2. The number of
states required to implement the optimal joint VA is M L1 + L2 . For high-order signal
constellation, for example 64-QAM, the computational complexity will be very high on
joint VA.
x
k
i ,1
x 2k, j
rk
Primary Channel
Estimate f1(k)
+
Secondary Channel
Estimate f2(k)
rˆik, j
-
eik, j
+
Fig. 5.2.6.1: Joint ML Sequence Detection between Adjacent Pair
80
JMLSE for the SDSL crosstalk interference on the ADSL channel model are derived
in this thesis. The basic concept is that all the possible transmitted signals of both DMTADSL and SDSL crosstalk are searched and that group of signals that best matches the
received signals over a given symbol period is found. JMLSE is the optimum detector
for a narrowband DMT-ADSL channel with relatively small AWGN. As an example
shown in Fig. 5.2.6.1, for the joint detection of two cochannel signals (desired ADSL and
SDSL crosstalk interference), the objective of JMLSE is to determine the pair of
sequences (ADSL signal and SDSL crosstalk) that minimizes the sum of the squared
error defined by the error likelihood sequence. The squared minimum distance for
JMLSD is used to allow accurate projection of the performance of the ADSL system.
When the channel is a finite impulse response, the joint Viterbi algorithm for JMLSE is
implemented with a method similar to the standard VA, as we have derived in the above.
5.3
Preliminary Performance Studies
In the same binder group, the spectral compatibility study here is a SDSL disturber
NEXT into a T1.413 full rate DMT-ADSL system [15]. The DMT-ADSL system has a
channel coding inside, which makes the SNR gap at a very low level; we have chosen a
gap of 4 dB in our simulation. As an example, assume that both ADSL and SDSL
channels are FIR, with a total channel memory of 2L = 8. The performance of the
optimal M 2 L = 2 8 = 256 states in JMLSE is required to implement a joint VA. That is, a
associated trellis diagram has 256 nodes at each stages. Notice here, that the complexity
if the JMLSE exponentially increases with the length of the channel impulse response.
81
Fig.5.3.1, shows that the bit error rate (BER) v.s. the channel SNR on multiuser and
single-user scenarios for the DMT-ADSL receiver. For the single-user receiver, the SNR
is 21.5 dB with BER of 10-7, and it just needs 18.3 dB with multiuser detection. The
JMLSE performs better than the conventional ADSL receiver does by more than 3 dB in
SNR.
In a DSL system, it is designed conservatively to ensure that a prescribed probability
of errors occurs. The margin of a design at a given performance level, which we use
here, is the amount of additional SNR in excess of the minimum required for a given
code with a gap (= 4 in our example) [15]. The margin can be represented as
γ m arg in =
SNR
Γ ⋅ (2 2b − 1)
,
(5.3.1)
where Γ = ( Γ( Pe , C ) , which is a function of a chosen probability of symbol error Pe and
the line code, C.) is the gap, and b is the achievable bit rate on the ADSL system, which
is,
b=
SNR
1
log 2 (1 +
).
Γ
2
(5.3.2)
It has also been shown that the modified ADSL receiver can outperform the conventional
receiver much better in the margin, as in Fig. 5.3.2.
82
Bit Error Rate for ADSL
-2
10
single-user detector
-4
10
-6
10
BER
-8
10
multiuser via JMLSE
-10
10
-12
10
-14
10
-16
10
17
17.5
18
18.5
19
19.5
20
20.5
21
21.5
22
SNR in dB
Fig.5.3.1: BER for ADSL System with Single-user Detector and JMLSE
83
20
15
JMLSE
Margins in dB
10
5
0
-5
-10
-15
-20
-25
Single-user Detector with SDSL Crosstalk
-30
4
6
8
10
12
14
16
18
ADSL Service Length in kft
Fig.5.3.2: ADSL System with SDSL Crosstalk on Single-user Detector and JMLSE
84
CHAPTER SIX
LOW COMPLEXITY ENHANCEMENT ON ADSL RECEIVER
JMLSE is an “optimal,” but has a high computational complexity for any DSL
channels. This approach estimates the channels of both the desired signal (ADSL signal
here) and the cochannel interference, and then uses a vector-JMLSE equalizer to jointly
demodulate the desired signal and crosstalk. The full search for the minimum distance
requires approximately equal to (number of sub-channel)∗(set size of crosstalk)2
computations. Therefore, the complexity increases exponentially with the sum of the
channel lengths of the desired signal and the crosstalk. We use some simplification
methods to reduce the complexity of JMLSE. The technique we proposed is sort of
having feedback session between the primary and secondary sequence estimators.
Meanwhile, we also review an alternative method, called Tone-Zeroing [77], [81] for
complexity reduction. Our comments with this method have also been discussed after the
reviewing.
6.1
Tone-Zeroing Method
Using the loading algorithm [78], [79] in DMT system together with the studies on
ADSL and SDSL spectral compatibility results, a sub-optimum solution on ADSL
receiver enhancement and modified deployment plan will be proposed.
85
With the property of DMT system, a proposed scheme for the SDSL and the DMTADSL joint detection minimum distance improvement is to zero a few tones in the DMTADSL transmission that correspond to the largest instance of the SDSL crosstalk noise.
After FFT output, the crosstalk detector is used to find out the crosstalk look-up table. It
can be realizes as, the DMT-ADSL receiver decides initially the SDSL crosstalk
sequence by using the tone zeroed for the DMT on corresponding sub-channels. In
another word, by using tone zeroing, it can eliminate various crosstalk error event
sequences from consideration.
Simulation result has shown that it reduces the
complexity and also largely mitigating the crosstalk noise on DMT-ADSL system. For
some case, less than 5 tone zeroed, it can improve more than 10 dB in margin, comparing
to single-user ADSL solution.
Communications theory allows accurate projection of the performance through
the calculation of the squared-minimum distance for the joint ML detector [72], [80] as,
2
d min
=
N
min
( X n ,C i }≠{ X n' ,C 'i }n = 0
∑| H
n=0
n
( X n − X n' ) − (C ni − C ni' ) | 2 ,
(6.6.1)
The expression in Eq.(6.1.1) for jointly detection minimum distance can be increased
in value by zeroing DMT-ADSL signal on tones where the SDSL crosstalk signals are
large. As we have discussed in the previous section, the number of the tone being zeroed
is depended on the coupling DSL data rate, the ADSL transmitting throughput and its
bandwidth. In fact, in very high bit rate DSL (VDSL), just a few zeroed tones lead to a
dramatic improvement in minimum distance [81]. The choice of setting tones to zero
depends on knowledge of where crosstalk signals have the largest energy, but generally
the band of any crosstalk is known, if the various of DSL systems are co-located in a
Telco CO. Loading algorithms in DMT allow for various tones to be easily zeroed and
86
thus unused [59]. For example, in DMT-VDSL, it may be wise to zero tones in the 7 –
7.3 MHz transmission band because of radio emissions [81].
The receiver for this prototype can be derived in Fig.6.1.1 and is considerably
simplified, but slightly more performance loss, with respect to JMLSE. The receiver
decides initially the crosstalk sequence Ci by using only the tones zeroed for DMT-ADSL
system. Upon detecting the crosstalk signal, the proper crosstalk coupling function is
applied and the entire crosstalk interference on the remaining tone is reconstructed and
subtracted, leaving only desired DSL signals and background noise. This is like “EchoCancellation” type method on crosstalk noise suppression at DMT-ADSL receiver. In
another word, the DMT-ADSL system seems “orthogonal” to the crosstalk signals on
these “heavy crosstalk affected tones”. If the data rate of the crosstalk signal is low and
the SNR is excellent, only a few tones are necessary to create a detection error probability
below 10-7.
Y
y
-
FFT
Crosstalk
Detector
DMT
Decoder
+
Ci
Crosstalk
Table
Fig. 6.1.1: Joint ML Crosstalk Signal Canceller with Tone Zeroing
87
We use the same example of the SDSL coupling to the DMT-ADSL channel, in
section 5.3, and assume that the DSL channel is static and constant on crosstalk profile
table.
By zeroing about 20 tones to build up a NEXT cancellation table, we can get
about 10 dB in margin near 18kft, shown in Fig. 6.1.2. Therefore, there is a large
potential for us to delivery a high bit rate, with crosstalk profile table modifications on
receiver.
20
15
JMLSE
Margins in dB
10
5
0
-5
-10
Tone-zeroing
-15
-20
-25
Single-user Detector with SDSL Crosstalk
-30
4
6
8
10
12
14
16
18
ADSL Service Length in kft
Fig. 6.1.2: Margin on DMT-ADSL with Tone-zeroing Crosstalk Noise Cancellation
88
Surely, this method has an advantage of mitigate the NEXT and complexity
reduction (comparing with JMLSE) with asymmetric and symmetric services coexist.
The key issue for the tone zeroing is necessity of accurate modeling of noise (crosstalk),
as described in [77]. Since the feedback section is using some kind of adaptive filter
technique. The adaptive filter coefficient is largely depends on frequency components
with high power. If a frequency band making NEXT noise has small power, it can not be
modeled correctly due to high power frequency component until sufficient number of
coefficient are used [77]. Therefore, the tone zeroing modeling works well for high
frequency power noise component. If so, in a common case of the telephone channel,
many kinds of random noises often occur in any selected frequency band, it is very likely
to make an error decision on the cancellation table and induce error propagation.
As described in the above, tone zeroing technique has a deterministic co-channel
signals profiles assumption (crosstalk table), which may lead error propagation, due to
the random source signal transmissions and various random noises in any selected
frequency band on DMT-ADSL channel.
Therefore, very frequently crosstalk table
tracking and updating are needed in order to make accuracy crosstalk signals estimation.
This processing makes the receiver frequently adaptive to random channels and may
more complexes to realize in practical loops. But, we still believe that tone zeroing is a
good technique on reducing computational complexity to achieve a better throughput. It
performs a better solution for less complicated loops, especially in DMT version DSL
solutions.
The simplified technique that we use in this thesis is a multi-stage joint MLSE for
ADSL receiver.
This method is a sub-optimal to the ideal joint MLSE estimator,
89
provides an excellent way to trade a sub-optimal performance for reducing complexity.
This approach can apply to both DMT and non-DMT versions of DSL solutions in the
same manner.
6.2
Low Complexity Joint MLSE
6.2.1 Multi-stage JVA
The structure of the Joint MLSE, as derived in the previous section is a
straightforward extension of the single channel VA. The drawback for Joint MLSE is the
large computational complexity, due to the exponential increasing on the transition states.
In the Fig.5.2.5.1, as an example of only one co-channel interference case, for a M-ary
symbol alphabet, the JVA requires M L1 + L2 states, with M2 transition leaving (and
entering) every state.
In order to reduce the complexity of JMLSE (or JVA), we introduce a multi-stage
JVA method. Using the same example in Fig.5.2.5.1, we can describe a two-stage
JMLSE scheme in Fig.6.2.1.1, which can be extended, to N stages on N co-channel
interference case, without loss generality. As a first step, the complexity reduction can be
attempted by employing a two-stage JVA having only M L1 + M L2
states by
implementing a successive interference cancellation approach [52]. For N co-channel
interferences case, this computational complexity is reduced largely comparison with
JMLSE, and its ratio can be derived as
R=
M L1 + M L2 + ... + M LN
M L1 + L2 +...+ LN
(6.2.1.1)
90
As an example, assumption on all equal tap length, L, the Eq. (5.2.1) can be further
simplified as
R=
N ⋅ML
= N ⋅ M L (1− N )
N ⋅L
M
(6.2.1.2)
In Eq. (6.2.1.2), it is always true to have N > 1 in any telephone binders, thus, L(1-N) <0.
It is obvious to us that R is always (much) smaller than one. Therefore, multi-stage joint
MLSE reduces the computational complexity largely comparison with ideal joint MLSE.
This multi-stage VA technique is very similar to conventional VA receiver (section
5.2.2), instead having multi-stage inputs and outputs. The primary (strong) signal r1(k) is
estimated using low delay decisions from a single-channel VA, and r (k ) − rˆ1 (k ) is
forwarded to the second VA section to estimate the co-channel signal. This structure that
we use it here, as a category of JVA, through it likes a feed-forward multi-stage single
channel VA detectors.
We name this as multi-stage JVA (MS-JVA).
The major
advantage for this structure is largely reducing the complexity on optimal JVA as shown
in Fig. 6.2.1.1. Its computational complexity is in a similar range of a single-channel
VA, with just a scale-increasing factor by N (N is the total number of UTPs in a binder,
assuming the same length, L, for all the channels.).
91
dˆ1 ( k − L1 )
r(k)
dˆ2 ( k − L2 )
+ r ( k ) − rˆ (k )
+
_
VA
1
L1
M states
dˆ1 ( k )
1
VA
M L2 states
L1
Fig. 6.2.1.1: Two-stage JVA (without Feedback Section)
The trade-off on mitigation of the crosstalk with this method is relatively poor
performance comparing to the optimal JVA at a low signal-to-crosstalk ratios (SCRs)
channel condition. The reason for this is while the secondary section receives a relatively
CCI free signal sequence, the primary section is sensitive to the un-cancelled secondary
signal.
In practice, a viable reduced-complexity single-user MLSE receiver can retain fewer
survivor sequences, one for each combination of the latest S ≤ W hypothesized symbols.
The choice for S is a trade-off between complexity and performance [82]. Fig. 6.2.1.2
92
shows the single-user MLSE receiver computational flow structure for unknown channels
when the signal’s second order statistics are known.
93
Fig. 6.2.1.2: Single-user MLSE Computational flow structure
94
dˆ1 ( k − L1 )
s1 (k )
+
r(k)
+
_
VA
M L1 states
k ,L
dˆ1 1 ( k )
dˆ2 ( k − L2 )
+
s (k )
VA
+ 2
M states
_
ˆ
(
)
r
k
k ,L
fˆ1 ( k − 1) 1
dˆ2 2 (k)
L2
rˆ2 (k + 1)
fˆ2 ( k )
Fig. 6.2.2.1: Two-stage JVA (with Feedback Section)
6.2.2 Multi-stage JVA with Feedback
Achieving the better performance and complexity reduction on the ADSL receiver,
we introduce a multi-stage JVA with feedback section (w/FB), shown in Fig. 6.2.2.1. A
similar structure has been used by [83] on a two-stage JMAPSD detector. Hence, we use
multi-stage JVA, instead of JMAPS. The reason is that it is preferable using JVA due to
tolerate longer decoding delays, because the complexity of JMAPSD grows exponentially
with the decoding delay, while it is essentially linear for the [83]. This characteristic of
JVA fits the need of the ADSL receiver, which widely used in real-time multimedia
applications. As shown in Fig. 6.2.2.1, where at time k, the low delay causal decisions
from the secondary, namely {dˆ 2,i (k − 1),..., dˆ 2,i (k − L2 )} , are used to cancel a portion of
95
the cochannel signal r2(k) from the input to the primary VA section. This structure just
has an additional L2 tap filter on computational complexity comparing to the MS-JVA.
The performance on MS-JVA-w/FB is considerably better than MS-JVA, as the MSJVA-w/FB can cancel the secondary energy corresponding to the previous estimated
symbol dˆ 2 ( k − j ) , where j = 1,2,…,L2.
A suboptimal multi-stage JMLSE rule to make a decision on the (k-L)th symbol, at
time k, is dˆ ( k − L) = d n (k − L) , where
dˆ k , L = d nk ,L ,
n = Arg[max p( d nk ,L | r k )]
(6.2.2.1)
i
In each single stage channel, the MLSE metrics are updated independently like derived in
section (5.2.2). It is shown in Eq. (5.2.2.8)
ln p r (t ) β (r (t ){β }) =
t E T 
∑ ln p
i = t B T 
ri (t ) Ri −1 , β
(r (t ) R( ) , {β })
i
i −1
(6.2.2.2)
In a similar to [83], the overall two-stage JVA is summarized in the following two
steps. This algorithm can be easily applied to N stage JVA with a similar extension.
96
Two-stage JVA Algorithm
Step 1: 1st JVA stage
(1): Determine 1st. input s1 (k ) = r (k ) − rˆ 2 (k )
(2): Update 1st JVA metrics with Eq. (6.2.2.2)
(3): Compute 1st decisions with Eq. (6.2.2.1)
(4): Compute total estimate of 1st. signal
L1
rˆ1 ( k + 1) = ∑ f1,l ( k − 1)dˆ1,max ( k − l )
l =0
Step 2: 2nd. JVA stage
(1): Determine 2nd input s1 (k ) = r (k ) − rˆ 2 (k )
(2): Update 2nd JVA metrics with Eq. (6.2.2.2)
(3): Compute 2nd decisions with Eq. (6.2.2.1)
(4): Compute total estimate of 2nd signal
L2
rˆ2 ( k + 1) = ∑ f 2,l ( k )dˆ 2, max ( k + 1 − l )
l =0
Step 3: Return to step 1 for a new sequence.
97
This MS-JVA-W/FB employs only an additional L2 tap filter in comparison with MSJVA. For large ADSL channel sequences, it has the same computational complexity as
the MS-JVA. Our studies have shown that the MS-JVA-w/FB has considerably better
performance than the MS-JVA.
Further more, this enhancement and reasonable
complexity are exactly suitable for our proposed DMT-ADSL receiver with crosstalk
environments, which normally above 10 dB in SCR [15].
Therefore, we choose MS-JVA-W/FB for the enhanced DMT-ADSL receiver.
Moreover, a T/2-spaced MLSE algorithm is used for this proposed receiver. In the next
sub-section, a practical T/2-spaced MLSE receiver is described, which has a great
advantage than conventional MLSE receiver for unknown channels.
6.2.3 Practical Enhanced ADSL Receiver
In Fig. 6.2.3.1, it shows the block diagram of a practical ADSL channel system.
n(t)
{β l }
Channel
c(t)
g(t)
+
g*(t)
Sampling
rate 2/T
{βˆ l }
T/2-spaced
MLSE
T/2-spaced
noise-whitening
filter
Fig. 6.2.3.1: Practical ADSL Channel System
98
Since rate 2/T sampling satisfies the sampling theorem, the two systems can be
represented by the T/2-spaced discrete-time signals. Let G(2)(z), C(2)(z) and H(2)(z) be the
z-transform of the T/2-spaced discrete-time signals that correspond to g(t), c(t) and h(t),
respectively, where g(t) is the shaping function, c(t) is the impulse response of the
telephone channel function, and h(t ) = g (t ) ∗ c(t ) . The z-transform of the autocorrelation
function of the noise samples at the output of the receiver filter g * (t ) = N 0 X g( 2) ( z ) ,
where X g( 2 ) ( z ) = g ( 2) ( z )( g ( 2) (1 / z * )) * . Using the factorization
X g( 2 ) ( z ) = V g( 2 ) ( z )(V g( 2) (1 / z * )) * ,
(6.2.3.1)
the noise can be whitened by using a filter with transfer function (V g( 2) (1 / z * )) * . The ztransform of the overall response at the output of the noise-whitening filter is
Veq( 2) ( z ) = G ( 2) ( z )C ( 2 ) ( z )(G ( 2) (1 / z * )) * /(V g( 2) (1 / z * )) *
= C ( 2) ( z )V g( 2) ( z ) .
(6.2.3.2)
On the other hand, we have
H ( 2 ) ( z ) = G ( 2 ) ( z )C ( 2) ( z )
(6.2.3.4)
and
99
X ( 2) ( z ) = G ( 2 ) ( z )(G ( 2) (1 / z * )) * C ( 2) ( z )(C ( 2 ) (1 / z * )) *
(6.2.3.5)
C ( 2) ( z )(C ( 2) (1 / z * )) * = Vc( 2) ( z )(Vc( 2) (1 / z * )) *
(6.2.3.6)
Let
be a factorization of C(2)(z)(C(2)(1/z*))* such that (Vc( 2) (1 / z * )) * has a minimum phase.
Using Eq. (6.2.3.1), Eq. (6.2.3.5) and Eq. (6.2.3.6), we have
X ( 2 ) ( z ) = V g( 2 ) ( z )(V g( 2) (1 / z * )) * Vc( 2) ( z )(Vc( 2) (1 / z * )) * .
(6.2.3.7)
The transfer function of the noise-whitening filter must be chosen as
1 /((V g( 2) (1 / z * )) * (Vc( 2) (1 / z * )) * ) . Therefore, the overall transfer function at the output of
the noise whitening filter, is equality to conventional one, V(z), which is given by
V ( z ) = V g( 2) ( z )Vc( 2 ) ( z ) .
(6.2.3.8)
The equivalent response Veq( 2) ( z ) in Eq. (6.2.3.2) has the same amplitude as V(z), but
different phase. Also,
Veq( 2) ( z )(Veq( 2) (1 / z * )) * = X ( 2 ) ( z )
(6.2.3.9)
100
Therefore, the distance between sequences of channel outputs using the system in
T/2-spaced MLSE channel is the same as in the conventional MLSE channel, that
implements the matched filter, and they have the same performance. The advantage of
the T/2-spaced system is that the noise-whitening filter does not depend on the unknown
channel and has a fixed structure. The unknown overall channel can be estimated after
the noise-whitening filter and the MS-JVA-W/FB is then implemented using the
combined metric in Eq. (5.2.3.9). Although the number of computational needed in this
practical receiver is about twice as the conventional receiver [72], the latter one cannot be
implemented for unknown channels. Moreover, for unknown channels the conventional
MLSE implemented with a matched filter has poor performance when the matched filter
is implemented using an inaccurate channel estimate.
6.2.4
Example and Comparison
We consider adjacent pair wire line co-channel interference as an example. Assume
that the channel has PAM modulation with desired channel memory of two symbols. The
trellis for VA in the desired channel section has two parallel transitions. The computer
simulation performances on the symbol error rate vs. channel signal-to-noise ratio for
ideal JMLSE, multi-stage JMLSE with feedback section and without feedback section
have been studied. As we mentioned in section 6.2.2, the SCR is normally above 10dB in
most of the DSL channels, we have chosen SCR = 10 dB in our simulation studies. The
results are shown in Fig. 6.2.4.1. From Fig. 6.2.4.1, we can see that MS-JMSE W/FB
outperform MS-JMLS WO/FB significantly when SCR is 10 dB or better. This approach
is a sub-optimal solution to ideal JMLSE with slightly degradation, but has about 90%
101
saving in computational complexity.
Therefore, multi-stage JMLSE with feedback
section is our solution for ADSL receiver enhancement.
102
0
10
-1
Symbol Error Rate
10
-2
10
+ : MS-JMLSE-WO/FB
* : MS-JMLSE-W/FB
-3
10
o : Ideal-JMLSE
-4
10
4
6
8
10
12
14
16
18
20
22
Signal-to-Noise Ratio
Fig. 6.2.4.1: Desired Channel Performance with Three Methods
103
CHAPTER SEVEN
PERFORMANCE EVALUATIONS AND SIMULATION RESULTS ON
ENHANCED ADSL RECEIVER
In current DMT-ADSL receiver, channel noise is lumped together and accommodated
by reach and rate restrictions as well as margin limits. No attempt is currently made to
take advantage of the structure of the interferers. This “single user” approach ignores the
underlying sources of noise in environments where spectral interference occurs.
However, channel capacity is inherently higher in communications channels that employ
multiuser receivers to distinguish and address discrete noise sources to effect higher
performance (e.g., rates, reach and margin), as derived in section 3.2. JMLSE technique
described here takes advantage of such principles to compensate crosstalk noise and
enable higher loop plant utilization.
The multiuser detector is completely compatible with existing DMT-ADSL standards
and is designed to be integrated into commercial DMT-ADSL transceiver chipsets with
modest computational impact. The multiuser detector technique can be inherently singleended and relies on input available in the DMT-ADSL network.
104
7.1
Test Environment
The ADSL noise compensator has been tested on simulated DSL disturbers, with a
significant margin gain demonstrated. For the purposes of this thesis, examples are
shown which illustrate this impact when the compensator is implemented in a DMTADSL CPE receiver, subject to foreign NEXT (major threat, hence from the SDSL
services and some other DSL services) in realistic deployment scenarios.
7.2
Test Channel Conditions
The ADSL receiver crosstalk compensation is single-ended, which is present at the
receive side of the ADSL link. The victim DSL service is DMT-ADSL. Disturber that
we investigate here is 2B1Q SDSL NEXT, HDSL NEXT and ISDN NEXT. Because in
the frequency band between 25 to 138 KHz, HDSL and/or ISDN services result in similar
and even slightly higher NEXT PSD level than ADSL. Therefore, in our crosstalk
simulation study, though we focus mainly on SDSL NEXT, but also with other types of
the above services. Moreover, considering the UTP binder segregation in real world is
not feasible [84], we will expect that all interfering sources to be in different types of
services. Meanwhile, the ADSL self-NEXT will not be considered as a disturber due to
the practical condition that ADSL is installed almost exclusively in FDM mode.
SNR improvement through recovery of margin depends on the particular loop
characteristics and disturber scenario. For this reason, the JMLSE receiver results are
stated in terms of margin recovery for specific scenarios, each of which include a main
channel specification, set of co-channel transfer functions, and a selected disturber set.
Three cases are shown that represent impaired DMT-ADSL loops, which are chosen from
105
G996.1 [85]. For each of these cases, the expected multiuser DMT-ADSL receivers’
performance improvement is stated in terms of margin recovery (SNR gain), bit rate
improvement, and loop reach.
For all scenarios described in this thesis, a UTP background AWGN level of –140
dBm/Hz is assumed.
7.3
Loop Characteristics
We choose three representative ADSL test loops for our simulation studies, which are
studied in [85]. They are shown in Fig. 7.3.1.
ATU -C
ATU-
Test Loop
#2
ATU-C
ATU -C
Test Loop
#3
ATU -C
ATU-C
26 AWG
26 AWG
26 AWG
Test Loop
#1
1500 ft
1500 ft
1500 ft
3000 ft
6000 ft
1500 ft
26 AWG
26 AWG
26 AWG
1500 ft
1500 ft
26 AWG
26 AWG
9000 ft
2000 ft 500 ft
500 ft
26 AWG
24 AWG
24 AWG
18000 ft
26 AWG
24 AWG
ATU -R
ATU -R
ATU -R
Fig. 7.3.1: Testing Loops
106
7.4
Capacity Improvement
To estimate capacity improvement (achievable transmission data rates) with enhanced
multiuser detection DMT-ADSL receiver, the margin is held at 6 dB and the bit loading
algorithm uses the improvement in SNR to calculate the maximum downstream ADSL
capacity.
7.5
Reach Improvement
To estimate reach improvement with enhanced multiuser detection DMT-ADSL
receiver, the margin is held at 6 dB, and the loop is extended until the simulation results
in a bit rate equivalent to the impaired bit rate.
7.6
Disturber Scenarios
The main focus on the spectrum management standard of this thesis limits the
maximum SDSL bit rate on a given loop length to assure spectral compatibility with
ADSL. As shown in Fig. 2.2.2.2, limit based on maximum SDSL bit rates is that
crosstalk from lower bit rates is always less damaging than crosstalk from higher bit
rates. This is not always obvious to all the practical cases, especially considering that
there may be mixed crosstalk from a number of lower bit rates, such as lower rate SDSL.
Our simulation results below show how the random SDSL bit rates and lower rate DSL
services implicit to downstream ANSI DMT-ADSL throughput.
To start, simulations run with randomly generated SDSL bit rates uniformly
distributed between 160 kbps and 2320 kbps. Each simulation has three clumps of SDSL
disturbers, and each clump has the same randomly generated bit rate. The total number of
107
SDSL disturbers is uniformly distributed, and the number of disturbers in each SDSL is
uniformly distributed with mean equal to one-third of the total number of SDSL
disturbers. Scatter plot of downstream ANSI DMT-ADSL bit rates on a 9 kft 26 AWG
loop as a function of the total number of SDSL disturbers with SDSL disturbers having
uncontrolled random bit-rates are presented in Fig. 7.6.1 [86].
Downstream ADSL bit ra
(kbps)
10000
9000
8000
7000
6000
5000
4000
3000
2000
1000
0
0
10
20
30
Total Number of SDSL NEXT
40
50
Fig. 7.6.1: Scatter Plot of Downstream ADSL Throughout with Mixed SDSL Crosstalk
108
Fig. 7.6.1 shows little correlation between random SDSL bit rate disturber numbers for
downstream ANSI ADSL bit rates. Our conclusion is that controlling the gross number
of SDSL disturbers has little effect on ADSL performance, without controlling the SDSL
bit rates, which is not practical in real world at all. The real solution is to modify the
DMT-ADSL receiver to mitigate crosstalk effect on the ADSL throughout.
Tables 7.6.1 list the disturber sets used in the simulation. The disturber scenarios
illustrate interference situations that might result from a predominately residential 25
pairs UTP binder that has just a few installed symmetric services to businesses. They
reflect a situation in which there is a mix of symmetric services installed prior to the
Spectral Management Standard [87], which do not conform to its’ deployment limitations
as well as Symmetric services that do conform to the Spectral Management Standard.
Table 7.6.1 Disturber Scenarios
Disturber
Pairs
Test Loop #1
Test Loop #2
Test Loop #3
3 SDSL
1 HDSL
2 SDSL
1 ISDN
18 DMT-ADSL
1.0 Mbps
784 Kbps
720 Kbps
160 Kbps
Fully Loaded
1.0 Mbps
784 Kbps
656 Kbps
160 Kbps
Fully Loaded
784 Kbps
784 Kbps
416 Kbps
160 Kbps
Fully Loaded
109
7.7
Co-Channel Transfer Functions
The NEXT co-channel transfer functions have been measured as the way in section
4.1 on real cable. These measured co-channels are similar to those found in the spectral
management draft standard [87]. These co-channels are used to simulate the coupling
between the DMT-ADSL and other DSL distributors.
7.8
Simulation Results
In the test simulation, each interference noise source in the disturber scenario (Table
7.6.1) is randomly assigned as cochannel input. Results are averaged due to the statistical
nature of the binder assignments.
The standard deviation of the improvements is
maintained and a representative case below shows the 1σ limits of the compensation
margin improvement.
It is useful to look at multiuser detection improvements from the limiting case of
when the disturbers are installed to the same equivalent working length in an intact
binder. In this case, all disturbers are assigned similar co-channel transfer functions that
represent approximate co-location of the disturbers and DMT victim.
The results of the simulation test of the compensator for DMT-ADSL CPE receiver
are shown below in Fig. 7.8.1 through Fig. 7.8.3. In these figures, we compare three
different solutions, which are conventional (currently deployed), ideal JMLSE, and multistage JMLSE with feedback section DMT-ADSL receiver.
110
Achievable Downstream Data Rate in Mbps
4
square : ideal JMLSE
x : multi-stage JMLSE
3.5
o : conventional ADSL receiver
3
2.5
2
1.5
1
0.5
0
9
10
11
12
13
14
15
16
17
18
ADSL Service Length in kft
Fig. 7.8.1: Rate-reach curves for Test Loop #1
111
Achievable Downstream Data Rate in Mbps
3.5
square : ideal JMLSE
3
x : multi-stage JMLSE
2.5
o : conventional ADSL receiver
2
1.5
1
0.5
0
9
10
11
12
13
14
15
16
17
18
ADSL Service Length in kft
Fig. 7.8.2: Rate-reach curves Test Loop #2
112
Achievable Downstream Data Rate in Mbps
10
9
square : ideal JMLSE
8
x : multi-stage JMLSE
7
o : conventional ADSL receiver
6
5
4
extension
prediction
3
2
1
0
4
6
8
10
12
14
16
18
20
ADSL Service Length in kft
Fig. 7.8.3: Rate-reach curves for Test Loop #3
113
Fig. 7.8.1 through Fig. 7.8.3 shows how the margin improvement enabled by the
enhanced multiuser ADSL receiver. This modification can be used for either increasing
the capacity, which moving achievable data rate vertically from the conventional rate to
the great improved rate, or deployment limits, which moving reach limit horizontally
from the conventional deployment rage to the further extension limits.
Furthermore, Fig. 5.1.1 show that when services strictly adhere to spectral
management deployment limits, crosstalk from the other DSL services in the channel can
affect the DMT downstream rate at points significantly removed from the coupling. In
these cases, as well as those that represent legacy disturber scenarios that may exist in the
loop plant prior to the spectrum management standard [15].
The multiuser ADSL
receiver improvement in bit rate and loop reach extensions, and represents an important
performance enhancement to the DMT type DSL receivers.
114
CHAPTER EIGHT
CONCULUSIONS
This thesis suggests that the traditional approach to DSL cochannel interference
modeling and receiver design may dramatically under-project achievable capacity level in
DMT-ADSL transmission systems. With the increasing importance of spectral
compatibility and a difficulty in surmounting the multiple problems created by the
mixture of different DSL services, the principle of multiuser detection has been used to
relieve substantially the problems created by crosstalk in ADSL system.
The use of this enhanced multiuser detection technique has a wide array of potential
benefits for spectral management and deployment in all DSL services, where interference
exists due to legacy services, and newly deployed services with heavy crosstalk noise.
This approach is a core method on improvements of either increasing transmission data
rate, or extending deployment areas, or compensating in poor BER DSL channels, based
on different requirements. In our studies, it has shown that this modified ADSL receiver
is able to achieve and sustain significantly higher data rates. Also, this enhancement on
the receivers having ability to reject the effect of interferers, the length limit on
potentially interfering services, such as SDSL services, may be relaxed without harm to
victim services (like ADSL).
115
Our simulation results show that higher rate services can be deployable further out in
the loop plant. Therefore, this approach on the ADSL receiver gives degrees of freedom,
and great overall loop plant utilization, while preserving spectral compatibility.
Finally, our enhanced ADSL system also has acceptable computational complexity
for current VLSI capability.
116
CHAPTER NINE
RECOMMENDATIONS
Without loss generality, using the multiuser detection receiver technique described
herein to mitigate the effects of crosstalk can be applicable across all existing and
contemplated DSL transceivers, including DMT/QAM/CAP ADSL, HSDL, SDSL and
future VDSL.
The benefits vary and are significant. Further more, the techniques
contained herein are extensible to fiber and wireless.
Studies of the twisted-pair channel (TPC) model and conventional crosstalk coupling
function [55], [88] show the characteristic of the TPC attenuation and NEXT function in
Fig.9.1. It is explicit that for high data rate downstream ADSL transmission between 6 to
14 kft, JMLSD is needed to suppress the SDSL NEXT interference. Other complexity
reduction methods for joint VA decoding will be further studied for this enhanced ADSL
receiver. As it reaches further, such as above 14 kft, the NEXT will be very large and
easy to detect, and then it will be easy to cancel them. Based on the ADSL downstream
data rate threshold or noise margin, a switched dual-mode of single-user and multiuser
DMT-ADSL receiver could be used for simplicity and less latency with QoS of the
transmission rates.
117
0
-10
-20
analytic channel model, in Eq.(2)
Gain in dB
-30
-40
-50
squared crosstalk coupling function
-60
-70
-80
-90
0
500
1000
1500
Frequency in kHz
Fig.9.1: Channel Attenuation and NEXT Characteristic
118
REFERENCES
[1] M. L. Honig, P. Crespo and K. Striglitz, “Suppression of Near- and Far- End
Crosstalk by Linear Pre- and Post- Filter,” IEEE J. Select. Areas in Comm., pp. 614-629,
April 1992.
[2] S. Cox and P. Adams, “An Analysis of Digital Transmission Techniques for a Local
Network,” Brit. Telecommun. Technol. J., vol. 3, no.3, July 1985.
[3] J. W. Lechleider, “Broad Signal Constraints for Management of the Spectrum in
Telephone Loop Cables,” IEEE Trans. Commun., vol. COM-34, July 1986.
[4] J. Campbell, A. Gibbs and B. Smith, “The Cyclostaionary Nature of Crosstalk
Interference from Digital Signals in Multipair Cable – Part I: Fundamentals,” IEEE
Trans. Commun., vol. COM-31, May 1983.
[5] , “The Cyclostaionary Nature of Crosstalk Interference from Digital Signals in
Multipair Cable – Part II: Application and Further Results,” IEEE Trans. Commun., vol.
31, May 1983.
[6] K. J. Kerpez, “Near End Crosstalk is Almost Gaussian,” IEEE Transactions on
Communications, Vol. 41, No. 5, May 1993.
[7] “Compromise for ADSL Performance Classed,” T1E1.4/2000-045R2, Telcordia
Technologies, February 2000.
[8] C. Valenti, “Regarding the Spectral Compatibility of 2B1Q SDSL,” ANSI
Contribution T1E1.4/99-261, Telcordia Technologies, June 7, 1999.
119
[9] “Network and Customer Installation Interfaces, Asymmetric Digital Subscriber Line
(ADSL) Metallic Interface,” T1.413-1998 (issue 2), ANSI.
[10] “ITU-T Draft G.992.2, Splitterless Asymmetric Digital Subscriber Line
Transceivers,” ITU-T, Draft Recommendation G.992.2, February 4, 1999.
[11] G. Young, K. T. Forster and J. W. Cook, “Broadband Multimedia Delivery over
Copper,” BT Tech. J., vol. 13, no. 4, Oct. 1995.
[12] J. Cioffi, “ Mitigation of DSL Crosstalk via Multiuser Detection and CDMA,”
ANSI, T1E1.4/98-253, August 1998.
[13] J. H. Unger, “Near-End Crosstalk Model for Line Code Studies,” ECSA
Contribution, T1D1.3/85-244, November 12, 1985.
[14] K. W. Cheong, J. M. Cioffi, “Coexistence of 1 Mbps HPNA and DMT VDSL via
Multiuser Detection and Code Division Multiplexing,” T1E1.4/99-120, March 8, 1999.
[15] Asymmetric Digital Subscriber Line (ADSL) Metallic Interface, ANSI Standard
T.413-1995, ANSI, New York.
[16] J. H. W. Unger, “ NEXT Model for Line Code Studies,” Bellcore T1D1.3/85-244,
November 1985.
[17] C. Valenti, “Cable Crosstalk Parameters and Models”, Bellcore T1E1.4/9730September 1997.
[18] G. Zimmerman, “Spectral Compatibility of 260, 384 and 768 kbps 2B1Q DSLs,”
T1E1.4/96-226, July 1996.
[19] K. J. Kerpez, “Variable Bit-Rate 2B1Q Spectral Compatibility within CSA Range,”
T1E1.4/98-029, March 1998.
120
[20] K. J. Kerpez, “ The Spectral Compatibility of SDSL with T1.413 ADSL and
G.992.2-G.lite” T1E1.4/99-031, February 1999.
[21] Qi Wang, “The Spectral Compatibility of High Rate 2B1Q SDSL with T1.413
ADSL and G.992.2-G.lite” T1E1.4/99-097, March 1999.
[22] M. Steenstra, J. Yang, and M. Rushing, “Specifications for Sub-rate HDSL,”
T1E1.4/98-343, November 30, 1998.
[23] G. Zimmerman, “Spectral Compatibility of 260, 384, and 768 2B1Q DSLs,”
T1E1.4/96-226, July 1996.
[24] K. J. Kerpez, “Variable Bit-Rate 2B1Q Spectral Compatibity within CSA Range,”
T1E1.4/98-029, March 4, 1998.
[25] Liang C. Chu, and Martin A. Brooke, “An enhancement study on the SDSL
upstream receiver,” Proc. on IEEE International Symposium on Circuits and Systems,
Volume: 4 , 6-9 May 2001, pp.: 442 –445.
[26] Liang C. Chu, and Martin A. Brooke, “Mitigation of Crosstalk on The SDSL
Upstream Transmission With Vector Equalization,” Proc. on IEEE International
Conference on Communications, June 11-14, 2001.
[27] A. Peled and A. Ruiz, “Frequency Domain Data Transmission Using Reduces
Computational Complexity Algorithms,” International Conference on Acoustics, Speech,
and Signal Processing, April 1980, pp. 964-967.
[28] A. Ruiz, J. M. Cioffi, and S. Kasturia, “Discrete Multiple Tone Modulation with
Coset
Coding
for
the
Spectrally Shaped
Channel,”
IEEE
Transactions
on
Communications, 1991.
121
[29] A. Ruiz and J. M. Cioffi, “A Frequency-Domain Approach to Combined Sprectral
Shaping and Coding,” ICC’87, June 1987, pp. 1711-1715.
[30] P. S. Chow, J. Tu, and J. M. Cioffi, “Performance Evaluation of a Multichannel
Transceiver System for ADSL and VHDSL Services,” IEEE Journal on Selected Area in
Communications, August 1991.
[31] A. Ruiz, J. Cioffi, and S. Kasturia, “Discrete Multiple Tone Modulation with Coset
Coding for the Spectrally Shaped Channel,” IEEE Transactions on Communications, Vol.
40, No. 6, June 1992.
[32] R. G. Gallager, “Information Theory and Reliable Communication,” Wiley, New
York, NY, 1968.
[33] John Bingham, “Multicarrier Modulation for Data Transmission: an idea of whose
time has come,” IEEE Communication Magazine, vol. 28, no. 5, pp. 5-14, 1990.
[34] J. C. Tu and J. Cioffi, “A Loading Algorithm for the Concatenation of Coset Codes
with Multichannel Modulation Methods,” Global Telecommunications Conference, pp.
1183-1187, December 1990.
[35] T. N. Zogakis, J. T. Aslanis Jr., and J. Cioffi, “Analysis of a Concatenated Coding
Scheme for a Discrete Multitone Modulation System,” IEEE MILCOM, vol. 2 pp. 433437, 1994.
[36] Ranjan V. Sonalker, Richard R. Shively, “An Efficient Bit-Loading Algorithm for
DMT Applications,” IEEE Communications Letters, Vol. 4, No. 3, March 2000.
[37] J. M. Cioffi, “A Multicarrier Primer,” Stanford University.
[38] P. S. Chow, “Bandwidth Optimized Digital Transmission Techniques for Spectrally
Shaped Channels with Impulse Noise,” Ph.D. thesis, Stanford University, CA May 1993.
122
[39] R. F. Fisher and J. B. Huber, “A New Loading Algorithm for Discrete Multitone
Transmission,” Proc. IEEE/Globecom, London, UK, 1996.
[40] J. C. Tu, “ Theory, Design and Application of Multi-channel Modulation for Digital
Communications,” Ph.D. thesis, Stanford University, CA, June 1991.
[41] J. Cioffi, “A Multicarrier Primer,” ANSI Contribution T1E1.4/91-157, November
1991.
[42] John Bingham, ADSL, VDSL and Multicarrier Modulation, John Wiley and Son,
Inc. 2000.
[43] ITU-T g.992.2 Standard, “Digital Transmission System for ADSL Transmission on
Metallic Local Loops with Provisioning to Facilitate Installation and Operation in
Conjunction with Other Services.”
[44] S. Verdu, “ Adaptive Multiuser Detection,” from Coder Division Multiple Access
Systems, Kluwer, 1995, pp. 97-116.
[45] J. W. Cook, “Wideband Impulsive Noise Survey of the access network,” BT
Technol. Journ., 11(3):155-162, July 1993.
[46] I. Kalet, “The Multitone Channel,” IEEE Trans. Commun., pp. 119-124, Feb. 1989.
[47] W. D. Reeve, “Subscriber Loop Signaling and Transmission Handbook,” IEEE
Press, New York, 1995.
[48] Bell Laboratories Staff, “Transmission Systems for Communication,” ATT, New
York.
[49] F. P. Duffy and T. W. Thatcher, Jr., “1969-70 Connection Survey: Analog
Transmission Performance on the Switched Telecommunications Network,” Bell Sys.
Tech. J., vol. 50, 1971, pp. 1311-1347.
123
[50] M. B. Carey, H. T. Chen, A. Descloux, J. F. Ingle, and K. I. Park, “1982-83 End
Office Connection Study: Analog Voice and Voiceband Data Transmission Performance
Characterization of the Public Switched Network,” ATT Bell Lab. Tech. J., vol. 63, 1984,
pp. 2059-2119.
[51] J. Cioffi, Electrical Engineering Class Notes at Stanford University, Fall 2000.
[52] S. Verdu, “Multiuser Detection,” Cambridge Press, 1998.
[53] J. M. Cioffi, K. W. Cheong, “Coexistence of 2- 10 Mbps Home-Phone LANS and
DMT VDSL via Multiuser Detection,” T1E1.4/99-333, June 1999.
[54] I. Kalet, and S. Shamai, “On the Capacity of a Twisted-Wire Pair: Gaussian Model,”
IEEE Trans. on Communications, Vol. 38, No. 3, March 1990, pp 379-383.
[55] J. J. Werner, “The HDSL Environment,” IEEE Journal on Selected Areas in
Commun., Vol. 9, No. 6, August 1991.
[56] T. Cover and J. Thomas, “Elements of Information Theory,” Wiley, NY, 1991.
[57] Andrea Goldsmith, Wireless Communications, Class Notes, Fall 1999, Stanford
University.
[58] C. E. Shannon, “A Mathematical Theory of Communication,” Bell Systems
Technical Journal, vol.27, 1948.
[59] T. Starr, J. Cioffi, and P. Silverman, “Understanding DSL Technology,” PrenticeHall, NJ, 1999.
[60] R. Blahut, “Theory and Practice of Error Control Codes,” Addison-Wesley, NY,
1983.
[61] K. Jacobsen, “Spectral Compatibility of ADSL and VDSL,” ANSI T1E1.4/97404R1, December 1997.
124
[62] Liang C. Chu and Martin Brooke, “A Study on Multiaccess xDSL Channels
Transmission Capacity,” Proc. IEEE PACRIM 2001.
[63] G. D. Forney, “Maximum-Likelihood Sequence Estimation of Digital Sequences in
the Presence of Intersymbol Interference,” IEEE Trans. Information Theory, Vol. IT-18,
May 1972.
[64] J. Proakis, Digital Communications, McGraw-Hill, New York, 3rd Ed., 1995.
[65] K. Giridhar, S. Chari, J. J. Shynk and R. P. Gooch, “Joint Demodulation of
Cochannel Signals Using MLSE and MAPSD Algorithms,” Proc. IEEE ICASSP, April
1993.
[66] P. A. Gresh, “Physical and Transmission Characteristics of Customer Loop Plant,”
Bell Syst. Tech. J., pp 3337-3385, Dec. 1969.
[67] R. L. Freeman, Telecommunication Transmission Handbook, Wiley, New York,
1981.
[68] H.L.Van Trees, "Detection, Estimation, and Modulation Theory, Part I," New York,
John Wiley and Sons, 1969
[69] D.Verdin, T.C.Tozer, "Generating a Fading Process for the Simulation of LandMobile Radio Communications," Electronics Letters, vol. 29, no. 23, pp2011-2012, 11
Nov. 1993
[70] G.M.Vitetta, D.P.Taylor, "Maximum Likelihood Detection of Differentially
Encoded PSK Signals Transmitted over Rayleigh, Frequency-Flat Fading Channels," in
Globecom, San Francisco, 1994, pp1889-1893
125
[71] J.H.Lodge, M.J.Moher, "Maximum Likelihood Sequence Estimation of CPM
Signals Transmitted over Rayleigh Flat-Fading Channels," IEEE Trans. Commun., vol.
38, no. 6, pp787-794, June 1990.
[72] G.D.Forney, "Maximum-Likelihood sequence Estimation of Digital Sequences in
the Presence of Intersymbol Interference," IEEE Trans. Inf. Theory, vol. 18, no. 3,
pp363-378, May 1972
[73] G.Ungerboeck, "Adaptive Maximum-Likelihood Receiver for Carrier-Modulated
Data-Transmission Systems," IEEE Trans. Commun., vol 22, no. 5, pp624-636, May
1974.
[74] B. Ottersten, R. Roy, and T. Kailath, “Signal Waveform Estimation in Sensor Array
Processing,” Proc. 23rd Asilomar Conf. Signals, System, Computer, Nov. 1989, pp. 787791.
[75] G. Xu, Y. Cho, A. Paulraj, and T. Kailath, “Maximum Likelihood Detection of Cochannel Communication Signal via Exploitation of Spatial Diversity,” Proc. 26th
Asilomar Conf. Signals, System, Computer, Nov. 1992, pp. 1142-1146.
[76] K. Ishida, I. Oka, and I. Endo, “Cochannel Interference Canceling Effects of MSE
Processing and Viterbi Decoding for On-board Processing Satellites,” IEEE Trans.
Commun., vol. COM-34, pp. 1049-1053, Oct. 1986.
[77] Jun Mo Koo, etc., “Frequency Selective NEXT Cancellation,” IEEE ICASSP 2000,
Vol. 5 pp. 2841-2844.
[78] P. Chow and J. Cioffi, “Method and Apparatus for Adaptive, Variable-Bandwidth,
High-Speed Data Transmission of a Multiuser Signal over Digital Subscriber Lines,”
U.S. patent 5,479,447, December 29, 1995.
126
[79] J. Campello, “Optimal Discrete Bit Loading for Multiuser Modulation Systems,”
IEEE International Symposium on Information Theory, August 1998.
[80] Edward A. Lee and David G. Messerschmitt, Digital Communication, Second
Edition, Kluwer, 1994.
[81] J. Cioffi and K. Cheong, “Coexistence of 2-10 Mbps Home-Phone LANS and DMT
VDSL via Multiuser Detection,” T1E1.4 June 1999.
[82] G.Vitetta, D.P.Taylor, "Maximum Likelihood Sequence Estimation of Uncoded and
Coded
PSK
Signals
Transmitted
over
Rayleigh,
Frequency-Flat
Channels,"
Supercomm/ICC, New Orleans, 1994, pp1-7.
[83] K. Giridhar, J. J. Shynk, A. Mathur, S. Chari, and R. P. Gooch, “Nonlinear
Techniques for the Joint Estimation of Cochannel Signals,” IEEE Trans. On
Communications, vol. 45, pp. 473-484, April 1997.
[84] Bell Atlantic, “Binder Group Segregation is not Feasible,” T1E1.4/99-018.
[85] G996.1 “Test Procedures for DSL Transceivers,” ITU June 1999.
[86] Ken Kerpez, “2B1Q SDSL Crosstalk: Mixed Bit Rates and Numbers of Disturbers,”
T1E1.4/2000-219R1.
[87] “Draft Proposed American National Standard, Spectrum Management for Loop
Transmission Systems,” T1E1.4, 2000-002R6.
[88] R. Conte, “ A Crosstalk Model for Balanced Digital Transmission in Multipair
Cables,” AT&T Tech. J., vol. 65, no. 3, May-June, 1986.
127
128
BIOGRAPHY
Liang C. Chu was born in Shanghai, China at January 29, 1965. He received his M.S.
in electrical engineering at the City College of New York, CUNY, in 1990. He worked
with Science and Technology, Bell South Inc., Atlanta, GA and SCS Telecom. Inc., Port
Washington, NY. He also taught undergraduate and graduate courses in the Department
of Electrical and Computer Engineering, Manhattan College, Riverdale, NY.
His research interests include multiuser detection and communication theory, wireless
communications, broadband access technologies, and digital signal processing.
He has received Regent's Scholarship at Georgia Institute of Technology and
University Merit Fellowship at the City University of New York for his graduate studies.
He is a student member of IEEE.
129
Download