Academia.eduAcademia.edu

On sphere detection for OFDM based MIMO systems

2010

The mobile wireless communication systems has been growing fast and continuously over the past two decades. Therefore, in order to fulfill the demand for this rapid growth, the standardization bodies along with wireless researchers and mobile operators around the world have been constantly working on new technical specifications.An important problem in modern communication is known as NP complete problem in the Maximum Likelihood (ML) detection of signals transmitting over Multiple Input Multiple Output channel of the OFDM transceiver system. Development of the Sphere Decoder (SD) as a result of the rapid advancement in signal processing techniques provides ML detection for MIMO channels at polynomial time complexity average case. There are weaknesses in the existing SDs. The sphere decoder performance is very sensitive for the most current proposals in order to choose the search radius parameter. At high spectral efficiencies SNR is low or as the problem dimension is high and the c...

MEE 10:80 On Sphere detection for OFDM based MIMO systems MD. SHAMSER ALAM This thesis is presented as part of Degree of Master of Science in Electrical Engineering Blekinge Institute of Technology September 2010 Blekinge Institute of Technology School of Engineering Department of Applied Signal Processing Supervisor: Dr. Jörgen Nordberg Examiner: Dr. Jörgen Nordberg Abstract The mobile wireless communication systems has been growing fast and continuously over the past two decades. Therefore, in order to fulfill the demand for this rapid growth, the standardization bodies along with wireless researchers and mobile operators around the world have been constantly working on new technical specifications.An important problem in modern communication is known as NP complete problem in the Maximum Likelihood (ML) detection of signals transmitting over Multiple Input Multiple Output channel of the OFDM transceiver system. Development of the Sphere Decoder (SD) as a result of the rapid advancement in signal processing techniques provides ML detection for MIMO channels at polynomial time complexity average case. There are weaknesses in the existing SDs. The sphere decoder performance is very sensitive for the most current proposals in order to choose the search radius parameter. At high spectral efficiencies SNR is low or as the problem dimension is high and the complexity coefficient can become very large too. Digital communications of detecting a vector of symbols has importance as, is encountered in several different applications. These symbols are as the finite alphabet and transmitted over a multiple-input multiple-output (MIMO) channel with Gaussian noise. There are no limitation to the detection of symbols spatially multiplexed over a multipleantenna channel and the multi user detection problem. Efficient algorithms are considered for the detection problems and have recognized well. The algorithm of sphere decoder, orders has optimal performance considering the error probability and this has proved extremely efficient in terms of computational complexity for moderately sized problems in case of signal to noise ratio. At high SNR the algorithm has a polynomial average complexity and it is understood the algorithm has an exponential worst case complexity. The efficiency of the algorithm is ordered the exponential rate derivation of growth. Complexity is positive for the finite SNR and small in the high SNR. To achieve the sphere decoding solution applying Schnorr-Euchner by Maximum likelihood method , Depth-first Stack-based Sequential decoding is used. This thesis focuses on the receiver part of the transceiver system and takes a good look at the near optimal algorithm for sphere detection of a vector of symbols transmitted over MIMO channel. The analysis and algorithms are general in nature. 2 I start with a few words of many acknowledgements on the hard work of research. Since I can think of few things equally rewarding, this is not one of those acknowledgements. Of course, research is not a one man show and without the help and encouragement of others, it can not be done. The work detailed in this report was undertaken as a component of my approved course of research for the master degree at the Blekinge Institute of Technology. My dissertation is tentatively entitled “On Sphere Detection for OFDM based MIMO System”. First and foremost I would like to thank my supervisor, Professor Jorgen Nordberg, for his support and giving me the opportunity to work within the laboratory for communication engineering and sharing his knowledge and expertise. I am as grateful for the freedom to explore and dwell on all aspects of the problems which pass before me, as I am for the occasional nudge in right direction. There are numerous members of the signal processing and communication theory laboratories who contribute to the excellent working environment and creative atmosphere. Finally, I most gratefully acknowledge the generous assistance of Blekinge Institute of Technology, Karlskrona, Sweden. Md. Shamser Alam 3 Contents Abstract ……………………………………………………………………………...2 Preface …………………………………………………………………………..….3 Chapter 1 1.1 1.2 1.3 1.4 Introduction ………………………………..…8 The Detection problem………………………………………………………….........8 Ordinary Solution…………………………………………………………………….9 Solution……………………………………………………………………………....9 Thesis Outline.……………………………………………………………….…...…10 Chapter 2 Overview of The Physical layer of The LTE System ………11 2.1 The OFDM Transciever…………………………………………………………….11 2.2 Transmitter……………………………………………………………………....….11 2.3 Source Generation…………………………………………………………….,..…..12 2.4 Digital Modulation Methods…………………………………………………....…..12 2.4.1 Quadrature phase-shift keying (QPSK)……………………………………....….12 2.4.2 16-Quadrature Amplitude Modulation (16QAM)……………………………….13 2.4.3 64-Quadrature Amplitude Modulation (64QAM)…………………………..…..14 2.5 UMTS-LTE Pilot Structure…………………………………………………………14 2.6 Zero Padding, OFDM Modulation And Cyclic Prefix Insertion……………...……15 2.6.1 Zero Padding…………………………………………………………………….15 2.6.2 OFDM Modulation………………………………………………….………..…16 2.6.3 Cyclic prefix………………………………………………………….……...….16 2.7 OFDMA………………………………………………………………….……..….17 2.8 Motivation of Receiver Structure……………………………………………..........19 2.9 OFDM Demodulation……………………………………………………….…..…19 2.10 Channel Estimation…………………………………………………………….......20 2.11 LMMSE Channel Equalization…………………………………………………….21 2.12 Frequency Selective Fading Channel Model…………………………………........22 2.13 ITU channel models………………………………………………………………..23 2.14 Doppler shift…………………………………………………………………….....24 2.15 Delay spread……………………………………………………………………….24 2.16 Soft and Hard De-mapping………………………………………………………..25 2.16.1 Quadrature phase-shift keying (QPSK)……………………………………......25 2.16.2 16 Quadrature Amplitude Modulation (16QAM)…………………………......26 2.16.3 64-Quadrature Amplitude Modulation (64QAM)…………………….…...…..26 2.17 LTE Uplink Transmission Scheme……………………………………….………..28 2.17.1 SC-FDMA……………………………………………………………………..28 4 2.17.2 SC-FDMA Parametrization….…………………………………....……………29 2.17.3 Uplink Data Transmission……………………………………………………..30 2.17.4 Uplink Reference Signal Structure……………………………………….…….30 2.17.5 Uplink Physical Layer Procedures………………………………………....,….30 2.17.5.1 Non-synchronized random access………………………………………....…..30 2.18 Uplink scheduling……………………………………………………………….....31 2.19 Uplink link adaptation………………...…………………………………...….…...31 2.20 Uplink timing control………………………………………………………………31 2.21 Hybrid ARQ………………………………………………………………............31 2.22 Channel Model Motivation………………………………………………………..32 Chapter 3 System Model …………………….…………………………..33 3.1 The MIMO Model…………………………………………………………………..33 3.1.1 Transmitted Symbol Vector…………………………………………………....…33 3.1.2 Detected Symbol Vector……………………………………………………...…33 3.1.3 Channel Matrix Preprocessing…………………………………………………...34 3.1.4 AWGN Channel Model………………………………………………………….35 Chapter 4 Sphere detection…………………………………………….36 4.1 Sphere decoding fundamentals……………………………………………………...37 4.2 The Fincke-Pohst and Schnorr-Euchner enumerations……………………………...40 4.3 The Schnorr-Euchner Search Order………………………………………………....41 4.4 An Incremental Radius…………………………………………………………........41 4.5 Search Algorithms …………..…………………………………………………......42 4.6 Description of Depth-first Stack-based sequential Sphere decoding Algorithm .....42 4.7 The Computational efficiency of Sphere Decoding………………………………...43 Chapter 5 Simulation Result …………………………...44 5.1 System channel model……………………………………………………………..44 5.2 System parameters for performance analysis and results…………………..………..46 5.2.1 Performance using QPSK modulation……………………………..………………46 5.2.2 Using 16-QAM modulation…………………………………….………………….47 5.2.3 Using 64-QAM modulation……………...………………………………………...47 Chapter 6 Conclusion ……………………………………………………49 Appendix…………………………………………………………………..50 Bibliography…………………………………………………………………………….54 5 List Of Figures 2.1 Full Block Diagram for the OFDM UMTS-LTE Transceiver…….……………..11 2.2 Block-Diagram of the OFDM UMTS-LTE transmitter…………………………12 2.3 Constellation diagram for QPSK…………………………………………...……13 2.4 Constellation diagram for 16QAM……………………………………………….13 2.5 64-Quadrature Amplitude Modulation (64QAM)……………………………….14 2.6 Basic downlink reference signal structure……………………………………….15 2.7 Zero padding in the time domain………………………………………………...16 2.8 The cyclic prefix addition to the transmitted OFDM symbol……………………17 2.9 Frequency-Time Representation of an OFDM signal……………………….…..17 2.10 OFDM symbol Sm as superposition of N narrowband modulated……………...18 2.11 OFDM Signal Generation Chain………………………………………………..18 2.12 Block-Diagram of the OFDM UMTS-LTE Receiver……………..…………...19 2.13 DFT converting from Time-domain to Frequency-domain and Vice-versa……20 2.14 General Channel Estimator Structure…………………………………………...21 2.15 Modified MMSE Estimator Structure…………………………………………..21 2.16 Frequency selective channel model...…………………………………………..23 2.17 The QAM De-mapping block diagram………………………………………....25 length 2.18 Implemented Quadrature phase-shift keying Constellations with Gray-Mapping.25 2.19 The implemented 16 QAM Constellations with Gray-Mapping………………..26 2.20 The implemented 64 QAM constellations with Gray-Mapping………………...27 2.21 LLR on the 16QAM constellation symbols……………………………………..27 2.22 Block diagram of DFT-s-OFDM (Localized transmission)…………………….28 6 2.23 Uplink slot structure………………………………………………………………29 2.24 Random access structure…………………………………………………………..30 2.25 Random access preamble...………………………………………………………..31 3.1 MIMO Communication System Diagram…………………………………………33 3.2 AWGN channel model…………………………………………………………….35 4.1 Weighted B-ary Tree………………………………………………………………39 5.1 System channel model block diagram………………………………………….....45 5.2 Performance analysis using QPSK modulation…………………………………...46 5.3 Performance analysis using 16-QAM modulation………………………………..47 5.4 Performance analysis using 64-QAM modulation………………………………..48 7 Chapter 1 Introduction Wireless communications has emerged as one of the largest and most rapidly growing sectors of the global telecommunications industry driven by the demand for increasingly sophisticated connectivity at anytime and at anywhere .Communication by using Multiple Input Multiple Output (MIMO) antenna architectures [69] promises to play a key role in fuelling this tremendous growth which is one of the most significant technological developments of the last decade. The Universal Mobile Telecommunication System-Long Term Evolution (UMTS-LTE) has certain objectives to obtain the high data rate, low latency and optimized radio access technology [67,68] .Multiple element antenna arrays are deployed at both the transmitter and the receiver in a MIMO system. The communications challenge lies to the quality of the transmission (i.e., bit error probability) and/or its data rate that are superior in designing the sets of signals simultaneously sent by the transmit antennas and the algorithms for processing those observed by the receive antennas to those supported by traditional single antenna systems. Increased reliability, reduced power requirements and higher composite data rates can be provided by these gains. The specialty exciting about the benefits offered by MIMO technology is that these gains can be attained without the need for additional spectral resources, which are not only expensive but also extremely scarce. Particularly, signal detection has been the subject of intensive study at the receiver end of the MIMO channel .The Sphere Decoder (SD) [18, 19,13, 20, 21] is one of the most important and industrially relevant algorithms to emerge from these efforts. Optimal detection of signals or the Maximum Likelihood (ML) transmitted over MIMO channels is well-known to be an NP-complete problem [8,71]. Sphere decoding (SD) came into view as a challenging method to exhibit the optimum ML solution for the MIMO decoding problem which reformulates the impractical exhaustive search over all possible vectors that is transmitted into an efficient depth-first tree search. However, the complexity of the depth-first search involved by the SD algorithm is dependent on channel and noise conditions and the complexity can reach in the extreme condition of an exhaustive search. The Sphere Detection has been revealed to offer ML detection at a computational complexity which is polynomial in the average case [70]. Fincke-Pohst and Schnorr-Euchner enumerations can be considered as the basis of two Sphere Detection algorithms. The two enumeration strategies build up these schemes which are considered as the representative of the majority of existing decoders and so are used as my benchmarks.The greatly enhanced performance both theoretical and laboratory settings [12,15,16,17] have been shown over the last ten years. Hence Sphere Detection is the recent explosion of interest from both academic and industrial researchers in the area of signal processing techniques for MIMO systems. 1.1 The Detection Problem: Existing Sphere Detection algorithms show two major weaknesses: First, the value chosen for the search radius parameter is highly sensitive for the performance of most 8 current proposals. The successful termination of the algorithm which provides the result of as an optimal solution, as well as its time complexity, are highly dependent on the search radius [18]. Secondly, the complexity coefficient can become very large when the SNR [11,12,13] is low, or when the problem dimension is high, e.g., at the high spectral efficiencies required to support higher communication rates, although its time complexity is polynomial in the average case .There are few detection problems in which the simultaneous detection of multiple users in a digital subscriber line (DSL) system affected by crosstalk [10] as the detection of symbols transmitted over the multi-user detection problem in the CDMA [7, 8, 9], multiple antenna wireless channel [1, 2, 3]. 1.2 Ordinary Solution: The detection algorithms are motivated and suboptimal research is computationally advantageous. The optimal, ML, detection problem is considered as to be NP-hard [8] which clearly indicates the polynomial complexity solutions are not obvious. The detection problem research in the last few years focuses on improving complex solutions and offers an acceptable probability of error performance. Grouping of detectors into classes is done as it is blurred to distinct between classes and so the detectors are placed in more than one class. The linear detector essentially only require a matrix vector multiplication but the error probability is typically much worse than that of the optimal detector. The linear detectors [23] are among the least computationally complex detectors when applied to the fading channel [3] or the channel matrix H is ranked deficient [24] where as the Decision Feedback Detectors [21,25,26,27,28]describe a nonlinear expansion of the linear detectors. Certain decisions are fed back into the detectors to get better results. However, the error of probability is occurred due to some decisions and limiting the quality of performance when applied to fading channels. Meanwhile, Error of probability provided by the feed back detectors decision over the linear counterpart increases the complexity marginally. At the end, relaxing the detection [29,30,31,32,33] problem does not necessarily lead to a large loss in terms of error probability. In fact, the main contribution shows that the SDR detector that achieves the maximal diversity in the real valued case when n  m. The lattice reduction [34,35,36,37,38] has the capability to improve the performance in terms of computational complexity and probability of many detectors. The suboptimal detectors performance is limited when faced with poorly conditioned channel matrices and the performance in terms of computational complexity, can be improved in some cases [13, 20]. 1.3 Solution: In this thesis, a simulation of the OFDM transceiver system [4,5] including the Sphere Detection is accomplished. For that purpose, a generic codeword Depth-first Stack-based sequential decoding Sphere Detector which is based respectively on both the FinckePohst and Schnorr-Euchner enumerations was implemented to obtain the optimal solution. The tentative performance of the implemented OFDM transceiver is evaluated by different QAM modulations. The thesis for sphere detection of a vector of symbols transmitted over MIMO channel basically focuses on the receiver part of the transceiver 9 link. The sphere decoder's performance is sensitive to its radius parameter where as it is very important in the digital communication system to detect information that carries symbols transmitted over a communications channel with multiple inputs and multiple outputs .The analysis and algorithm are general in nature. 1.4 Thesis outline: The first of my contributions introduces the sensitivity of the sphere decoder's performance to its radius parameter. In chapter 2, overview of the physical layer of the LTE system basically on OFDM based UMTS-LTE transmitter and receiver design structure with comprehensive details is illustrated where as the system model of the MIMO system is described in chapter 3 Chapter 4 details the basic concepts and fundamentals of mathematical implementation and the description of Sphere Decoding algorithm to find an ML solution in which the sensitivity of radius and its parameter are focused. In chapter 5 the performance of the designed system channel model is analyzed by different modulation techniques. Chapter 6 concludes this report on my work, which puts forward effective steps addressing the key issues both in sphere decoding and OFDM transceiver system, under certain conditions at a reduced time complexity. 10 Chapter 2 Overview of the physical layer of the LTE system 2.1 OFDM Transceiver: Figure demonstrates the LTE design of the transmitter and receiver on the basis of physical layer information and the structure is based on OFDM system which depicts the implemented structure. serial data source generat or serial to parallel convert er mappin g of QPSK, QAM,1 6QAM and 64QAM LTE pilot insertio n zero padding IFFT Parall el to serial conve rter cyclic prefix insertio n TO RX Multipa th channel model SER/B ER comput ation QPSK, QAM,1 6QAM AND 64 QAM demapp er FDE zero forcing equatio n LMMS E channel estimati on FFT serial to parallel convert er Cycli c prefix extrac tion RX Fig2.1: Full Block structure for the UMTS-LTE Transceiver 2.2 Transmitter: As the block diagram 2.2 describes the OFDM, UMTS-LTE transmitter structure. Here a 20 MHz bandwidth and the digital modulation are used to provide the feasibility required for the UMTS-LTE transmission chain. Generalized digital data is parallel and mapped into the complex block by modulation techniques. Symbol is referred as complex data block, and sub-carriers which is attached to data. The spectrum width is less than the sampling rate of the OFDM modulator as the unused bands are padded with zeros. Time version of signal is acquired by the IFFT and the time domain signals to all sub-carriers 11 AWGN are orthogonal to each other. The noise distortion and the inter symbol interference are the main drawback to the high data rate transmission. Frequency spectrums overlap in the process. Inter symbol interference is deleted as the signal duration allowed to be large enough by parallel interval OFDM transmission. I use the cyclic prefix to remove completely before every OFDM symbol transmitted. OFDM Transmitter parts are related in Diagram 2.2 showing the way the signal is transmitted. Mathematical formulas demonstrate more details as will be given in the next sections. Serial data Source generator Serial to parallel Convert er Serial Mapp er QPS K,16 QAM and 64Q AM LTE Pilot Inserti on Zero paddi ng IFFT Par alle l to Ser ial Co nve rter Cyc Rx lic Pref ix Inse rtio n Figure 2.2: Block-Diagram of the OFDM UMTS-LTE transmitter 2.3 Source Generation: The modeling of the data digital or analog in the communication system is done by a random binary source generator with equi-probable bits. D = [d0, d1, d2, d3, d4… dn] and d = {0, 1} The number of generated random integers in the form of bits per symbol and the number of sub-carriers are given by the modulation scheme. The data rate and the efficiency are developed by the constellation. 2.4 Digital Modulation Methods: QPSK, 16 QAM, and 64 QAM are commonly used modulation schemes. First serial to parallel conversion of data and then mapping are done here. High data rate, bandwidth and capacity for the UMTS-LTE are achieved by 16 QAM and 64QAM which are implemented in the LTE transceiver and QPSK. These are discussed in the following topics: 2.4.1 Quadrature phase-shift keying (QPSK): This is high order scheme and a pair of every two consecutive bits converted from serial to parallel and mapped to complex constellation in the modulator as shown in fig 2.2 [3]. There are 2 bits/symbol, 4bits/symbol, and 6bits/symbol for QPSK, 16QAm and 64 QAM respectively. The constellation diagram for the modulation scheme or four points with each of two data bits are shown in the figure: 12 Q 10 00 I 11 01 Figure: 2.3 Constellation diagram for QPSK 2.4.2 16-Quadrature Amplitude Modulation (16QAM): It is an efficient and high data rate, uses 4 bits/symbol. It produces high data rate than QPSK. The 16 QAM constellation figure is given as. Q 0111 0101 0001 0011 0110 0100 0000 0010 I 1110 0110 0100 0110 1111 0111 0101 0111 Figure: 2.4 Constellation diagram for 16QAM 13 2.4.3 64-Quadrature Amplitude Modulation (64QAM): This is capable to carry an amount of even higher data rate .There are 6bits/symbol mapped and used in the system like 802.11 a/g. As the symbols are equal, normalization of all the transmitted symbols is done. Constellation diagram of 64 QAM is shown similar case applied here as for QPSK and 16 QAM. I have this as shown in fig below. Q 000100 001100 011100 000101 001101 011101 000111 001111 000110 001110 010100 110100 111100 101100 100100 010101 110101 111101 101101 100101 011111 010111 110111 111111 101111 100110 011110 010110 110110 111110 101110 100110 000010 001010 011010 010010 110010 111010 101010 100010 000011 001011 011011 010011 110011 111011 101011 100110 000010 001001 011001 010001 110001 111001 101001 100001 000000 001000 011000 010000 110000 111000 101000 100000 I Fig:2.5 64-Quadrature Amplitude Modulation (64QAM) 2.5 UMTS-LTE Pilot Structure: A frequency selective channel model is used to get UMTS-LTE transceiver system done by simulation process in the multi-path propagation. It is difficult to track and estimate the multi-path propagation in OFDM system. Channel estimation techniques [23,5,18,19, 12] in which pilot symbols are used to various fading channel models and estimation of the instantaneous channel is required to decode the received symbol. The transmitter and receiver with the reference symbols carrying no data in the transmitted signal is done as in standard [1] figure 2.6 provides the downlink reference signal structure symbols to estimate channel. Main uses for this in LTE downlink reference [1] are as: 14 Frequency Domain D D D D D D D R1 D D D D D D D D D D D D D D D D D D D D D D D D R2 D D D D D D D D D D D D D D D D R1 D D D D D D D D D D D D D D D D D D D D D D D D R2 D D D D D D D D D D D D D D D D R1 D D D D D D D D D D D D D D D D D D D D D D D D R2 D D D D D D D D D D D D D D D D Figure: 2.6 Basic downlink reference signal structure R1: First Reference symbol R2: Second Reference symbol D: Data Time period: 0.5 ms • Measuring the channel quality • Estimation for different demodulation and detection at the end user side • Cell search and Initial acquisition This transmission of pilot symbols is an efficient way of tracking multi-path . By the assumptions of [1, section 7.1.1.1.2.2], neither all the frequencies bits nor the all transmitted OFDM symbols consists of pilots for UMTS-LTE. Figure above shows the OFDM symbols considered for the implementation with pilot tones. 2.6 Zero Padding, OFDM Modulation, And Cyclic Prefix Insertion: 2.6.1 Zero Padding: In the simplification of analog filter realization, the sampling rate is greater than bandwidth. That is why I use the zero fading in design at the transmitter. This will increase the spectrum signal length which is not the integer multiple of total length of signal. Length is adjusted by the time band limits or the frequency band limits. The time domain extension with zeros to signal is used. Fig depicts this as shown. 15 zero’s Actual length of the signal zero’s Fig: 2.7 Zero padding in the time domain 2.6.2 OFDM Modulation: The transmitted data is divided into low bit rate streams on OFDM schemes are carried as sub-carriers [20,23]. So OFDM is an efficient technique and selected by many wire line and wireless application. IFFT will reduce the complexity of the transmitter and I implement OFDM at the receiver part .DFT is required to demodulate the data as the low complexity FFT. Higher data rate is achieved but low rate streams are subjected to individual flat fading as it is transmitted over the selective frequency channel model. X (1), X (2), X (3), X (4)… X (N) are the transmitted symbols if Nsc sub-carriers .Mathematical discrete time representation for symbols is given as and is done by the normalization of all the OFDM IFFT symbols. Equation 2.1 showing this as: N-1 X(k)=1/√N ∑ X(n) x e-2πj (kn/N) X(k) n=0 Where k=0……N-1 The time domain symbols OFDM data are obtained by FFT given by the relation; (2.1) N-1 Y(n)=1/√N ∑ y(k) e-2πj (kn/N) Y(n) k=0 Where n=0…..N-1 2.6.3 Cyclic prefix: Wireless communication in multi-path faces many problems while the transmission is going on. Interference symbol and inter carrier interference are common over the time varying frequency selective channels. Cyclic prefix reduces the inter symbol interference which is similar to the last part of the transmitted OFDM symbol. Fig 2.8 demonstrates the cyclic prefix. Cyclic prefix must be adapted to delay spread related to signal. Short 16 and long are the two lengths in UMTS-LTE operation as in [1]. There are some conditions in the length must be same or longer than the channel impulse response length to get rid of interference. COPY OFDM SYMBOL TOTAL LENGTH OF THE OFDM SYMBOL INCLUDING CYCLIC PREFIX o Fig: 2.8 The cyclic prefix addition to the transmitted OFDM symbol l 2.7 OFDMA: The spectrum is divided into multiple sub-carriers which are orthogonal to each other and modulated by the low bit rate streams. OFDM system is developed in downlink transmission for the E-UTRA FDD and TDD modes. The WLAN, WIMAX and the broadcaster technologies like DVB are commonly used in the OFDM. It is robust comparing the multi-path fading form. Fig 4.8 represented an OFDM signal taken from [2]. Select 5MHz and principle remains the same for the E-UTRA. After modulation the transmission over the orthogonally spaced sub-carriers bandwidth is done. QPSK, 16QAM, and 64 QAM are the schemes for E-UTRA. To face inter symbol interference a guard time interval is added to each symbol which is cyclic prefix and is put before OFDM symbol. Fig: 2.9 Frequency-Time Representation of an OFDM signal 17 IFFT generates OFDM as it converts a N number of frequency domain complex symbol into time domain .In the figure below N point IFFT and a (mN+n) as the nth sub-carrier channel modulated data symbol in the time period mTu < tW(m+l)Tu. mTN time (m+1)TM a(mN+0) mTn time (m+1)Tn a(mN+1) a(mN+2) Sm(0),Sm(1),Sm(2)…. Sm(N-1) IFFT . . a(mN+N-1) Sm Figure: 2.10 OFDM symbol Sm as superposition of N narrowband modulated The vector Sm is the OFDM symbol and it is superposition of N narrowband modulated sub-carriers. A parallel stream of N sources modulated data provides a wave form of N orthogonal sub-carriers and sub-carrier shape is frequency Sinc function as in fig. 2.9. In Figure 2.11, mapping is shown as a stream serial of QAM symbols to N parallel streams in the form of frequency domain for the IFFT. Then a time domain signal is obtained by the N-point time domain system. QAM symbol rate= N/Tm symbols/sec Source(s) QAM Modulator N symbols stream 1/Tm symbol/sec OFDM Symbols 1/Tm 1:N IFFT Useful OFDM symbols N:1 symbols/s Fig:2.11 OFDM Signal Generation Chain Multi-path users are allowed in OFDMA as compared to an OFDM scheme. The principle is that the data channels are shared in E-UTRA, is a specific time frequency assigned to each user. Each transmission time interval of 1ms requires new scheduling decision assigned to time/frequency resources. 18 2.8 Motivation of Receiver Structure: The UMTS-LTE transceiver and the receiver part is designed for it at the user terminal (UT) side. The specific requirements about the low complexity and low cost should be assured. There are certain constrains of stringent power consumption as the mobile receivers are small. Receiver side has some additional operations with respect to the transmitter side. The signal received is in the form of convolution of the multi-path channel impulse response h(t) and the transmitted signal s(t). The guard period has been removed from the received signal. This is inverse process to the one at transmitter side and it is de-cyclic prefix. Fast Fourier Transform (FFT) converts the transmitted signal into the frequency domain and I obtain the modulated symbol values. In order to deal with the effect of the multi-path channel, a suitable channel-estimator is identified and implemented. As UMTS-LTE is an OFDM based system, the proposed Minimum MeanSquare Error (MMSE) channel-estimator in [80] has been implemented in this design. Here All the received signal sub-carriers experience a complex gain, amplitude and phase distortion, due to the multi-path fading channel. To counteract such influence of the channel, a simple frequency-domain equalizer (FDE), the LMMSE equalizer is employed. Afterwards, soft or hard QAM de-mapping schemes are employed. According to the assumptions made earlier, this system is an un-coded system; however, the coding part has been left as a future work. Further, it is also assumed as a fully synchronized OFDM transceiver system. The aforementioned UMTS-LTE receiver parts are discussed in more details throughout this chapter. Figure 2.12 shows the different parts of the UMTS-LTE receiver. SER/ BER COM PUT ATIO N Pa ral lel to ser ial co nv ert er QPSK, 16QAM and 64QAM Demapp er FD EZe ro Fo rci ng Eq uat ion M M S E Est im ati on F F T Ser ial to Pa ral lel Cy clic Pr efi x Ex tra cti on Rx Fig 2.12: Block-Diagram of the OFDM UMTS-LTE Receiver 2.9 OFDM Demodulation: Multiplication of the data sequence by the channel frequency response plus white Gaussian noise provides the received signal and it is distorted in this way. Multi-path channel converts the time domain signal into parallel symbols and discards the cyclic prefix. As the received signal is comprised of convolution of the multi-path channel impulse response h(t) and the transmitted signal s(t). OFDM transmitted symbol does not affect in the actual transmitted data of every next symbol. The Inter-OFDM symbol interference effect is eradicated by the cyclic prefix extraction. 19 OFDM de-modulation is completed as the received time domain signal converted to frequency domain by FFT, given in figure 2.13. Equation 2.1 has clearly shown the demodulated all N transmitted sub-carriers of the OFDM signal in the form of output of the N complex QAM symbols. Being the orthogonal system, demodulation is done by the multiplexing it with the same carrier frequency. The process is summed up by the sampling at receiver. Wide band systems use the FFT. Figure 2.13 depicts as DFT transforms from time domain to frequency domain and vise versa. Figure2.13: DFT converting from Time-domain to Frequency-domain and Vice-versa 2.10 Channel Estimation: The channel estimation technique used to estimate the realization of the multi-path channel effect in the receiver. The multi-path channel effect has problem as the each subband is disturbed by a channel of different random phase and amplitude. the challenging problems in wideband receivers is the tracking the effect of the multi-path channel . The cyclic prefix length used is longer than the channel impulse response in order to ensure that no inter OFDM-symbol interference is present. Generally, the multipath channel estimation can be carried out by using either additional pilot symbols into all sub-carriers of the OFDM symbols at instant time intervals, or by appending pilots into every transmitted OFDM symbol [72]. Pilot symbols can be either defined in the time-domain, or as a training sequence in the frequency-domain and these are called pilot symbols, and the latter are called pilot tones respectively. Pilot tones are known to the transmitter and the receiver part. The channel estimation is based on the pilots that transmitted at a certain positions in the time-frequency grid of the OFDM signal. Pilot tones, defined in [73] and used in my design, are transmitted together with the data symbols which make the design of the UMTS-LTE transceiver more robust against the fading effect of the channel. Based on the assumptions of [73] , I here considered the OFDM symbols that contain pilot tones in the implementation of the channel estimator. There are different channel estimators which can exploit the pilot tones frequencies to estimate the effect of the channel. Among these estimators are Least Square (LS), Minimum Mean-Square (MMSE), and Least Mean-Square (LMS). In [74] both Minimum Mean-Square, and Least Square (LS) channel estimators have been presented and implemented over a multipath faded channel. In UMTS-LTE transceiver design I implemented the Minimum 20 Mean-Square (MMSE) channel estimators, the modified one presented in [74]. The general channel estimator structure [74] is shown in Figure (2.14). X0 h0 Y0 XN-i IDFT Q DFT h N-1 YN-1 Fig 2.14: General Channel Estimator Structure The proposed MMSE channel estimator in [74] is providing high performance than the general form. It also shows better performance than the other proposed (LS). Further, to achieve low-complexity and better performance to the UMTS-LTE transceiver system, the modified version of the MMSE estimator, as in [74] has been selected for this OFDM transceiver design and implemented too. Figure 2.15 below shows the modified MMSE channel estimator. X0 h0 Y0 Q X N-i IDFT IDFT YN-i HN-i Fig: 2.15 Modified MMSE Estimator Structure 2.11 LMMSE Channel Equalization: The multiplication of the OFDM signal spectrum in the frequency-domain is caused by the time-domain convolution over the multi-path channel. As a result of this there will be appearance of multiplicative complex channel coefficients on each sub-carrier. Therefore the received sub-carriers will have a distortion on their amplitudes and shift to their 21 phases due to the multi-path channel effect. I implement a frequency-domain equalizer (FDE) to cope with the multiplicative effect introduced by the multi-path channel. The Frequency-domain equalizers are normally much simpler than their time-domain counterparts and will lead to a low complexity design for the receiver part. The transmitted signal is split up into many streams in OFDM systems. There will be a flat fading in after multi-path channel. As refer to the received signal by Y(n), for sub-carrier n, H(n) is the channel response, X(n) is the frequency-domain transmitted symbol, and N(n) is the additive noise. So I have: Y (n) = X (n) * H (n) + N (n) (2.2) Initially, LMMSE channel estimation is performed on the received signal and then the frequency-domain equalization is performed for each sub-carrier using the estimated channel. 2.12 Frequency Selective Fading Channel Model: There are several paths in the mobile communication world which are followed by signal from the source to destination. These are distributed as the buildings, vehicles and other obstacles in the way can reflect and cause scattering of signal. So there are many paths between BS base station and UT user terminal for the communication and received is summed as in Figure3.2. The paths have frequency response as superposition in this domain with a different Doppler shift and attenuation. the received signals from the paths will add up at the terminal side . Its power may vary depending on the distribution of the carrier phases and constructive or destructive values. There may be two fading due to fluctuations involved as Rayleigh fading in case of power varying randomly. The frequency selective fading is caused by different frequency domain at a point in the multi-path propagation. this result when there is multi-path phenomena as the transmitted arrives at the receiver with different spreading. As the length of the delay spread time is less than the period, or the bandwidth is less than the coherence bandwidth, all the frequencies face flat fading at the point. In case the length of delay spread is greater than the symbol period, or the signal bandwidth is higher than the coherence, the channel is selective fading channel model as given here: 22 t1 X(t) h(0) X΄(t) t2 h(1) . . tn h(n) Fig2.16: Frequency selective channel model The fig indicates as the transmitted signal is divided into many frequencies and each is experiencing a different effect in this frequency selective fading channel model. 2.13 ITU channel models: Time variant channels A and B for the vehicular and pedestrian are used for designing the UMTS-LTE transceiver in particular selective frequency. Modes are chosen for the requirements of the new LTE technology of the mobile generation. These are very efficient for the design because I need the higher robustness of the communication system. Pedestrian and vehicular are the categories in the models. There are two in pedestrian as A at 3km/h, (PA3) and B at 3km/h (PB3) and three in vehicular as A at 30 km/h (VA30), A at 120 km/h (VA120), and A at 350km/h (VA350). The high speed trains are obtained in 3GPP by 350 km/h. There are different delay taps number representing delay and power of the signal path. Channel power delay profiles are suitable for explaining the propagation. The Tables [21] describes the power profiles as given. 1. ITU pedestrian A (PA3) gives relative delay and the relative mean power as in table: Relative Delay [ns] Relative Mean Power [dB] 0 110 190 410 0 -9.7 -19.2 -22.8 Table2.1: ITU Pedestrian A channel model 23 2 ITU Pedestrian-B (“PB3”) gives Relative delay and power profiles for this channel as in table : Relative Delay [ns] Relative Mean Power [dB] 0 0 200 -0.9 800 1200 2300 3700 -4.9 -8.0 -7.8 -23.9 Table2.2: ITU Pedestrian-B Channel model 3 ITU Vehicular-A (“VA30”), (“VA120”), and (“VA350”) give Relative delay and power profiles for these channels as in table: Relative Delay [ns] Relative Mean Power [dB] 0 310 710 1090 1730 2510 0 -1.0 -9.0 -10.0 -15.0 -20.0 Table2.3: ITU Pedestrian A channel models 2.14 Doppler shift: As there are many different paths with electromagnetic propagation and different Doppler shift is exhibited in each path which is resulted due to the relative motion of the transmitter or receiver with respect to each other. The frequency components are affected and frequency shift occurs and Doppler shift is calculated by the equation. fd=(fcxv / c) x cosα From equation, fd is the Doppler shift, fc is the carrier frequency, v is the speed of the antenna, c is the velocity of light, and á is the angle of arrival of the received signal. when the direction is opposite between the antennas, then the maximum Doppler shift as calculated by the relation as: fd max = (fcxv )/ c 2.15 Delay spread: The transmitted signal copies received at the receiver side are different because the time difference between first and last one. This maximum time difference between first echo and the last path is called the delay spread. Flat fading in case if the length of spread is less than the symbol period and the channel is frequency selective if the delay spread higher than the symbol period. 24 2.16 Soft and Hard De-mapping Mapping schemes improve the spectral efficiency and increase the bit rate. QAM is defined in [1] and performs mapping of the bits at the transmitter part. Certain operations are necessary to be done at the receiver part. Hard de-mapping is used here and soft demapping is determined by long likelihood ratios (LLR). Fig 2.16 describes the QAM de-mapping . Rx Qrec(X) Qdemod(X) QAM De-mapper Fig 2.17:The QAM De-mapping block diagram Equation 2.3 given below actually determines the LLR operation. Qrec (x) and bit by bit probability estimation is measured by it. Z represents the corresponding bits before demapping as in figure 2.23. λ(Qrec(X))= log(pr{Qrec(x) =+1|Z}/Pr{Qrec(x)=-1|Z}) (2.3) The soft detection of QAM is done by the LLR bit by bit processing and the LLR has a definite range [-8,8]. 2.16.1 Quadrature phase-shift keying (QPSK): The de-mapping to bits of received symbols is done. The hard de-mapping for the QPSK is completed by the function of it . In a way to split the received equalized signal into two parts. Each of these in-phase and Quadrature carriers de-mapped, the original boundary signal is reconstructed by a two multiplexed out put stream. Q 10 00 I 11 01 Figure2.18: Implemented Quadrature phase-shift keying Constellations with GrayMapping 25 2.16.2 16-Quadrature Amplitude Modulation (16QAM): In this technique the in phase and quadrature components are demodulated separately and soft and hard de-mapping are used. Two streams are de-mapped by 4 Amplitude Phase Shift Keying in phase and 4 ASK Quadrature carriers in hard de-mapping. In case of soft de-mapping LLR ratios are used. Q 0111 0101 0001 0011 0110 0100 0000 0010 I 1110 0110 0100 0110 1111 0111 0101 0111 Figure2.19: The implemented 16 QAM Constellations with Gray-Mapping 2.16.3 64-Quadrature Amplitude Modulation (64QAM): This is implemented as the two bit stream de-mapped by 8ASK for in-phase and Quadrature carriers. The bits in every OFDM symbol with other symbols are considered. 16QAM [3] and 64QAM [6] are the gray coding schemes used at the transmitter and receiver part respectively. These are shown in fig 2.18, 2.19 and fig 2.20 indicate the LLR on 16QAM constellation symbol. 26 Q 000100 001100 011100 000101 001101 011101 000111 001111 000110 001110 010100 110100 111100 101100 100100 010101 110101 111101 101101 100101 011111 010111 110111 111111 101111 100110 011110 010110 110110 111110 101110 100110 000010 001010 011010 010010 110010 111010 101010 100010 000011 001011 011011 010011 110011 111011 101011 100110 000010 001001 011001 010001 110001 111001 101001 100001 000000 001000 011000 010000 110000 111000 101000 100000 Fig2.20: The implemented 64 QAM constellations with Gray-Mapping Fig2.21: LLR on the 16QAM constellation symbols 27 I 2.17 LTE Uplink Transmission Scheme: 2.17.1 SC-FDMA: Alternative investigation for the optimum uplink was performed in the LTE study. OFDM fulfills the requirements of LTE in downlink but it is not suitable for uplink because of having weaker peak to average power ratios (PAPR). That is why SC-FDMA with cyclic prefix is used for FDD and TDD in LTE uplink. These PAPR characteristics are better to get cost effective testing of UE power amplifier. As there are some similarities the parameterization of uplink and downlink can be harmonious. DFT spreads OFDM for E-URTRA and it is selected to generate an SC-FDMA signal as in fig 2.21. M-size DFT is applied to a block of M-modulation symbols. QPSK, 16QAM and 64QAM are the main techniques for the uplink E-UTRA schemes. Mapping for the sub carriers is available here. Transformation of the modulation symbols into frequency domain is done by the DFT. Only localized transmission on consecutive sub-carriers is allowed as N point IFFT (M<N) as in OFDM following the cyclic prefix and parallel to serial. 0 incoming bit stream Serial to parall el conve rter m1 bits Bit to constella tion mappin g m2 bits mm bits Bit to constella tion mappin g Bit to constella tion mappin g f0 0 f1 0 0 x(0,n) x(1,n) M-point FFT x(M-1 M/2 M/2-1 N-point IFFT Add cyclic prefix Parallel to serial converte r 0 0 ,n) fm-2 0 fm-1 0 0 Channel BW Fig2.22: Block diagram of DFT-s-OFDM ( Localized transmission) 28 DFT-spread-OFDM is simple difference between SC-FDMA and OFDMA signal generation. Information about all the symbols of transmitted modulation have been spread over the sub carriers by the DFT while OFDMA signal carriers information are related to modulation symbols. 2.17.2 SC-FDMA Parameterization: Downlink structure is similar to E-UTRA uplink with 20 slots of 0.5 ms and each sub frame of 2 slots as shown . Slot carries uplink symbols as N SC-FDMA symbols (N=7 for normal cyclic prefix and N=6 FOR extended cyclic prefix). The fourth symbol in the slot carries reference signal for channel demodulation. One uplink slot Tslot 1 2 ……… 3 UL ….. N SYMB-2 NULSYMB-1 Modulation symbol auNULSymb-2 Fig2.23: Uplink slot structure A bandwidth agnostic layer 1 specification for uplink has been selected. Configuration Number of symbols Normal cyclic prefix ∆f= 15 KHz 7 Extended cyclic prefix ∆f= 15 kHz 6 Cyclic prefix length in samples 160 for first symbol 144 for other symbols 512 Cyclic prefix length in µs 5.2 µs for first symbol l 4.7 µs for other symbols 16.7 µs Table2.4: Parameters for uplink generic frame structure. 2.17.3 Uplink Data Transmission: 29 There is a same uplink resource block size as the downlink in the 12 sub-carriers frequency domain. The factors 2,3 and 5 are allowed in uplink to simplify DFT and transmission time interval is 1 ms. Physical Uplink Shared Channel (PUSCH) data is determined by the transmission band with NTx and the frequency hopping pattern K0. It carries uplink information for example CQI and ACK/NACK which is same as data packets in downlink. This is transmitted on reserved frequency region. 2.17.4 Uplink Reference Signal Structure: Two different purposes of uplink reference, one is used for channel estimation in the eNode B receiver to demodulate control and data channels, second provides channel quality in the base station as a basis for the scheduling decisions. I have the sequence for the uplink reference signals as CAZAC (Constant Amplitude Zero Auto-Correlation) sequences. 2.17.5 Uplink Physical Layer Procedures: This is especially very important in E-UTRA. 2.17.5.1 Non-synchronized random access: In the transmission from idle-to-connected or to establish uplink synchronization, the random process may be used to request initial access. Fig. shows this structure as: TTI Scheduled data A B Scheduled data non synchronized random asscee channel random access channel Scheduled data Scheduled data non synchronized random access channel …… A non synchronized random access channel Scheduled data Scheduled data DATA TANSMISSION Scheduled data non synchronized random access channel random access channel 2 Scheduled data TRA Scheduled data TRAREP A=BWRA , B=BWSYSTEM Fig2.24: Random access structure 30 Scheduled data This can be defined in frequency domain to provide sufficient number of random access opportunities. Fig: 2.25 has a preamble .It occupies TPRE=0.8ms and cyclic prefix occupies TCP=0.1ms in a sub frame of I ms. Transmission depends on on guard time. Bandwidth of preamble=1.08 MHz(72 sub-carriers) when the transmission is allowed as the higher signaling controls. 64 random access preambles in each cell are created by Zadoff-Chu sequences. TRA CP TCP Preamble TPRE TGT Fig2.25: Random access preamble Power ramping similar to WCDMA is used in random process. As the preambles are sent, the UE waits for the response message. In case no response detected this process is repeated again. 2.18 Uplink scheduling: The e NodeB assigns time/frequency resources to UEs to inform about the transmissions. PDCCH in downlink communicates scheduling decisions affecting uplink to UEs. UE buffer status, UE capabilities, QoS, uplink channel, UE quality measure, UE measurement gaps etc. are the basis. 2.19 Uplink adaptation: There are certain things considered as the transmission power control, adaptive modulation, channel coding rate and adaptive bandwidth. 2.20 Uplink timing control: It is essential to control to give the transmission from different UEs with receiver of e NodeB. It sends the timing control as UEs in downlink to adopt the respective timing of transmit. 2.21 Hybrid ARQ: In this case e NodeB requests the transmissions of data packets. 31 2.22 Channel Model Motivation: In efficient wireless communication the propagation of the radio frequencies is carried out through communication channels. There are certain channels as the Additive White Gaussian Noise channel model (AWGN), and the frequency-selective channel model. I use AWGN channel here even though the LTE channel model is fading. The (AWGN) channel model investigates the effects of real channels on the performance of communications systems and easy to implement with the available computer simulation tools as Matlab which is one of the tools that used in simulating such models. Both AWGN and Frequency selective channel model are used to simulate and test the feasibility of the UMTS-LTE transceiver. 32 Chapter 3 System Model 3.1 The MIMO model: Consider the linear MIMO system as shown in figure 3.1 to communicate over the channel. I have to find the detection of a set of M transmitted symbols from a set of N observed signals. The non-ideal communication channel disturbs observations due to an additive noise vector as shown: n S v H DETECTOR Ŝ Fig:3.1 MIMO Communication System Diagram The simplified linear MIMO communication system diagram is showing the discrete time signals transmitted symbols vector s € XM, channel matrix H€ RNXM, additive noise vector n € RN, received vector v € RN, and detected symbol vector Ŝ € RM. 3.1.1 Transmitted symbol vector: Finite alphabet X = {x2,...... xB } of size B indicates the transmitted symbols to get the goal. The B possible transmitted symbol vectors, s € XM are selected based on the available data. 3.1.2 Detected symbol vector: As a result an optimal detector should returns as Ŝ = S*, given the observed signal vector v, is the largest the symbol vector and its posterior probability of having been sent as: s* = argmax s€XM P(s was sent | v is observed |) (3.1) Equation (3.1) is called as the Maximum A posterior Probability (MAP) detection rule. Suppose the symbol vectors s € XM are equi-probable that P (s was sent) is constant then the optimal MAP detection rule can be : s* = argmax s€XM P(v is observed |s was sent) (3.2) Maximum Likelihood (ML) detector always returns an optimal solution to satisfy (3.2). The additive white Gaussian noise n is considered to express the ML detection problem of Fig. 3.3 as the minimization of the squared Euclidean distance metric in order to meet a vector v over an M-dimensional finite discrete search set as: 33 s*= argmin s €xM |v -Hs|² (3.3) The optimization variables s and |v -Hs|² as the objective function are measured from the optimization literature. The wireless communication problems examples can be explained by defining the channel matrix H, the ML detection of lattice coded signals, QAMmodulated signals transmitted over MIMO at fading channels and frequency selective fading channels, as well as multi-user channels. 3.1.3 Channel Matrix Preprocessing The symbol decisions in the tree search are implicitly supposed such as starting from the last symbol in ŝ, as sm. For an arbitrary permutation matrix, π  Rm m, the optimization problem is: minŝ✁Sm ||y-Hπŝ||2 (3.4) as equivalent to the original ML detection problem in (1.4). if ś is the minimizer of (3.4), then ŝML = π-1ś. Applying sphere decoder with Hπ as the channel matrix yields an alternative detection ordering given by π. The QR factorization on Hπ is applied such that QR = Hπ, the effective upper triangular matrix R depends on the choice of π. The permuting concept the columns of H by right side multiplication by π will be referred to as channel matrix pre-processing [20] or detection ordering. There is a detection ordering different with respect to the search ordering discussed above. The strategy for the detection ordering and the search ordering can be applied independently. The choice of π should be such that reduces the complexity of the decoder, or the number of nodes in the search tree. It is shown in [59] that the optimal (in the way that the number of searched nodes is minimized) detection order π must be a function of the channel matrix H and the vector of received values, y. This optimal detection ordering, π, does not look to be tractable. There are a few suggestions for detection orderings which take the channel matrix, H, and the vector of received signals, y, into account [60, 59]. However, the detection ordering can only be based on channel complexity. An advantage is that the channel matrix pre-processing has to be done once as dealing with the constant deterministic channel or the channel matrix remains constant for many realization of y, a situation is faced when detecting symbols transmitted over the slowly fading channel [20, 3]. It is beneficial to make the admissible range for any intermediate symbol, ŝi, as small as possible. The greatest benefit of this strategy is achieved if the search tree is pruned near the root node at a great extent which corresponds to attempting to maximize the diagonal elements close to the lower right corner of R. A simple strategy is the column norm ordering [20] which sorts out the column of H in the increasing order of their Euclidean norm. There is only limited effectiveness in it as it does not take angle between the columns into consideration and parallel columns may result in a small value along the diagonal R. An effective approach to maximize the minimum diagonal elements of R as the V-BLAST Optimal ordering [61, 20] is used and the results in an ordering can be efficiently computed [6, 62]. 34 3.1.4 AWGN Channel Model: It is simple and comes from the impairment with this wireless model and the white noise. This noise is characterized by a random signal of certain spectral density and it is obtained by independent random samples from a Gaussian distributions. AWGN does not include any fading, dispersion or interference and a mathematical mode to represent the effect of thermal noise. It consists of a simple wireless channel and is used widely. As shown in the figure the complete picture of transmitter, receiver and AWGN channel. It was initially used for the purpose of confirming the feasibility of the UMTS-LTE. Transmitter Tx signal S(t) Additive White Gaussian Noise-h(t) Receiver Rx Signal r(t) Fig3.2: AWGN channel model The time difference between the signal echo and last one as the signal received at different instants is called the delay spread. A flat fading results if the spread length is less than the symbol period. Otherwise if greater, the channel is frequency selective. 35 Chapter 4 Sphere detection The detection of a vector of symbols transmitted over nxm MIMO channel is discussed in the thesis, where m and n denote the number of inputs and outputs respectively. The input and output relationship of the MIMO channel is given below: y = Hs+v (4.00) where s  Sm is the finite set of transmitted vector symbols , y Fn is the received signal vertor, H  Fnxm is the channel matrix and v Fn is the additive white Gaussian noise. Here F is the set of real or complex numbers, i.e. F  {R,C},according to the context. Detection of the vector symbols transmitted over the system channel model according to (4.00) is based upon y and H. A finite set of linearly modulated symbols transmitted over a known linear channel subject to Gaussian noise is modeled on the basis of (4.00) [11, 12]. Properties of receiver algorithms basically focuses on the detection is important here. In the most general term, a detector or receiver refers to a mapping which takes the vector of received signals, y and the channel matrix, H as inputs and thus produces an estimated symbol vector, ŝ as output [11]. That is, a detector is defined by some (possibly random) map. Φ: Fn Fnxmsm (4.01) where ŝ=Φ (y, H) and F is R or C. Computation of Φ relates to the implementation of the detector. Naturally, the exact interpretation how the detectors are beneficial in this system is debatable. The possibility that the minimum probability of error provided by the receiver in case of transmitted messages s  Sm, is the maximum-likelihood (ML) receiver [14,54], expressed as: ŝML = arg mins✁Sm ||y -Hŝ||² (4.02) The detector and receiver are always are interchangeable and referred to same thing. The number of symbols m is large enough and results are computationally difficult. A recent review of many possible extensions and improvements over the original algorithm is also provided in [21] under a unified framework which contains virtually all previously proposed implementations as special cases. The algorithm has also been studied under many different communications scenarios. Example include [48] focuses on the multiple antenna channel, [49,50].The sphere decoding (SD) algorithm is for multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) systems. Sphere decoding which was introduced originally by Finke and Pohst in [7] in 1985, enumerates all lattice points [22] in a sphere centered at a given vector. This detection technique was first applied to the ML detection problem (as it appears in the 36 communications context in the beginning 90 ’s [18,19,47],which gained main stream recognition with a later series of papers [49,50 ].The principle of the Sphere Detection algorithm [43,44] is to find the closest lattice point [45,46] to the received signal within a sphere of radius. Hence, it is possible to reduce the computational complexity, by restricting the search area. The choice of is very crucial to the speed of the algorithm where as in practice, it can be adjusted according to the noise (and eventually the fading) variance. The sphere decoder is developed on two stages. Firstly a pre processing stage computes the QR factorization of the channel matrix, H and after this a search stage finds the estimate, ŝML This detection algorithm has also been observed under many different communications scenarios. Focusing on the multiple antenna channel, with focus on the CDMA scenario, and to generate soft information required by concatenated coding schemes are the examples of different communication scenarios. The sphere decoding algorithm can be illustrated as a tree search procedure by a pruning criteria to reduce the search. It is also notable that there is no possibility that the Sphere decoding estimation does not belong to the set of leaf nodes visited by the algorithm (assuming there are some leaf nodes visited). This decoding algorithm [7] performs a depth-first search over the tree by visiting child nodes before sibling nodes. If the distance exceeds a certain radius d, it falls outside the sphere and is automatically pruned along with its children and siblings (if the latter are enumerated). The radius is updated as the distance to that leaf, if a leaf inside the sphere of radius d is reached. The sphere decoding algorithm also [13] depends on the initial search radius. There will be too many lattice points in the sphere if the initial search radius is too large where as there will be no points in the sphere if the radius is too small. A MIMO channel detector which produces a set of symbols s € Sm given a set of signals v €FN observed at the output of the communication channel, is typically modeled as a linear system H € Fnxm combined with an additive noise vector n €Fn .I surmise that M ≤ N and that H is of full rank M, i.e., there are at least as many observations as symbols to be detected. In the tree search analogy, the sequence of symbol decisions, {ŝm -k +1 ...,ŝm } which corresponds to a node of the search tree at the kth level, starts counting from the root of the tree which by default is at the 0 level.The nodes ordering before and during the tree search is important for the algorithm. With appropriate ordering, SD can improve detection performance significantly and provide the number of nodes required to search or the required number of multiplications to achieve maximum likelihood detection performance. 4.1 Sphere decoding fundamentals: The sphere decoding is based on the enumeration of points in the search set which are found within the sphere of some radius centred at a target such as the received signal point. The Fincke-Pohst (F-P) and Schnorr-Euchner (S-E) techniques are the two computationally efficient means of realizing this enumeration [7], and the foundation of most existing sphere decoders [6, 9] are formed by these. The F-P and S-E enumerations, and all SDs, are the QR-factorization of the channel matrix: N by M ≤ N matrix H with linearly independent columns factorization can be shown in factors as: 37 H= Q R 0 (4.1) Q is NxN and orthogonal, R is MxM, upper invertible and triangular, and 0 is an (N-M) xM matrix of zeros. As the objective function is invariant under orthogonal transformation, minimization problem can be written as argmin s €xM |V-Hs|2= argmin s€xM | QT v- R s|2 0 = argmin s €xM | vW-Rs|2 Where v = QTv (4.2) (4.3) , the lower limit 1 and the upper limit M extract the first M elements of the orthogonally transformed target. The factored matrix of the upper triangular structure then enables the decoder to decompose the equivalent objective function (4.3) recursively as: | vW-Rs|2=d2(vWM , rMM sM )+|(vW-rMsM)\M - R\MMS1M-1|2 = d2(vWM , rMM sM )+|ỹ(sM)- R\MMS1M-1 =∑0D=M-1d2(y(sMD+1)D,rDDSD) Where the squared Euclidean distance metric is d2(.) and I have ỹ(sMD+1)= ỹ(Φ)= vW, (4.4) (4.5) (4.6) D=M ( ỹ(sMD+2)-rD+1sD+1)\D+1 D=M-1,…………….,0 (4.7) a set of L= M-D constraint values are applied to optimization variables şD+1……………,şM and parameterize the residual target. Here y with a tilde shows that it resides in the same orthogonally transformed space as v . In this way the QR factorization provides the means of evaluating objective function efficiently. Many shared terms are contained in(4.6) summation for the decomposition. There are the values of the objective function for all BM-1 as in the first term of (4.5) which are involved in the search set satisfying şM = sM. So associate the constraint şM = sM with this term. The (4.7) summation lends itself naturally to a weighted representation B-ary tree. It is shown in Fig.4.1 for the case where M = B = 2 and X = {-1,1}. Each of the terms in the diagram in the summations of (4.6) associated with a constraint as well as with a branch. Then each node encapsulates a set of constraints şMD +1 = sMD +1 and these have been applied in a way 38 that specified by the branches traversed along its path from the root node. A residual target can also be associated with each node by computing (4.7). I observe that the variables must be constrained in order from şM to ş1 because of the QR factorization. σ(no)=0 Ş2=-1 Ş2=1 w(b1)=d²(ỹ(ø)2,-r22) σ(n1)= σ(no)+w(b1) Ş1=-1 w(b2)=d²(ỹ(ø)2,r22) Ş1=1 w(b3)=d²(ỹ(-1)1,-r11) Ş1=-1 w(b5)=d²(ỹ(1)1,r11) σ(n2)= σ(no)+w(b2) Ş1=1 w(b6)=d²(ỹ(1)1,-r11) w(b4)=d²(ỹ(-1)1,r11) σ(n5)= σ(n2)+w(b5) σ(n4)= σ(n1)+w(b4) σ(n3)= σ(no)+w(b3) σ(n6)= σ(n2)+w(b6) Figure 4.1: A weighted B-ary tree with M = 2 and X = {1; 1} . The above tree is explained by the problem parameters v, H, and X. A few properties of the tree are important to study sphere decoding algorithms. 1. Nodes are distributed over M +1 level, as the numbering from the root level node n at level 0 to the leaf nodes at M and no leaf nodes are at levels 0 through M-1. 2. Branches at levels L and L + 1 (L = 0,..........,M-1) are linked with variable şD, where I let D = M- L. 3. The B-ary, tree with each non leaf node is the parent of exactly B child. The each child branch corresponds to one of the B values in X in a way that the associated variable can take. There are BL nodes at level L, and each is associated with a set of L constraints şMD+1 = sMD+1. Particularly, each leaf node is associated with a full vector of constraints ş = s, where s € XM corresponds to a point in the search set. 4. This weighted tree; non-negative weights w(bj) and б(nk) are related with the branches and nodes, respectively by the proper assigning to the root node n0 the weight 0. 5.Nodes at level L to L+1 have branches to assign weights d2(y(sMD+1)D, rDDSD) ,so that the constraints şMD+1 = sMD+1 are related with the parent node at level L (Property 3), and şD = sD is the constraint associating to the branch. 6. The summation of branch weights along the path from the root provides each node weight or as the sum of weights of its parent node and the connecting branch. 7. The node weight are not decreasing following any path from the root to a leaf node. 39 8. The summation (4.7) is equal to the leaf nodes weights such that these values of objective function evaluated at each of the point in the search set. The properties 3 and 8 depict that the ML solution which is specified by the point in search set associated with the smallest leaf node weight in the tree of Fig.4.1. An exponential number of leaf nodes are considered, and in the similar way a comparable number of non-leaf nodes whose weights must all be computed in order to determine those of the leaf nodes. It is discussed in next section, how existing sphere decoders are able to reduce the number of computations from an exponential to an average case polynomial number. 4.2 The Fincke-Pohst and Schnorr-Euchner enumerations: The smallest weight leaf node starting from the root is searched by a sphere decoder. It should start at the root and only can express itself further by computing the weights of connected branches and nodes, because of the recursive definition of the node weights. The clever pruning process of the tree, makes it able to declare an ML solution which is based on the intermediate node weights after the computation of a polynomial number of weights in the average case [70]. This is done by the property 7. Considering the geometric structure, the leaf node weight corresponds to the squared Euclidean distance from a point in the search set to the target. Points located within the sphere of radius C centred at the target can be enumerated by exploring from the root along all the branches such that node nk is encountered as б(nk) > C². Descendents of node nk have weights at least as б(nk) because of property 7. Therefore the point linked with the leaf nodes must lie outside of the search sphere. Then reduction of the time in computing the tree based search is done by pruning at node nk. It means that the weights of branches and nodes which are descendants of node nk, need not to be computed. By traversing the tree in depth-first [75, Ch. 29] procedure, from left to right, until all nodes having weights not greater than C2, are discovered. It returns a list of leaf nodes that relate to points located within the search sphere. This shows the behaviour of the Fincke-Pohst (F-P) enumeration with respect to the tree in Fig.4.1. The implementation can be found in works such as [76, 70]. A characteristic of the F-P strategy is that a search radius must be specified. Remember if C is too large, many node weights will have to be computed and a large number of leaf nodes may be returned. If it is too small, no leaf nodes will be found and the decoder must then be restarted with a larger search radius. These factors impact the overall computation time negatively, and so one of the main weaknesses of the F-P decoder is the sensitivity of its performance to the choice of C. Particularly the distance of the Babai point [76], is a point in the search set and it is assured to find one leaf node. Values of C and the F-P enumeration are used in the first decoder referred as the FPB. Specifically, the Schnorr-Euchner (S-E) enumeration adds a certain refinement to the F-P approach. The tree is traversed in depth first from left to right in the F-P strategy, in a way as the children of a node are considered in order of increasing si  X, where i is the level of the parent node and recall that each of its children is linked with applying the additional constraint şi = si. The strategy S-E also shows that the traversing of the tree in depth- first rules instead of considering child nodes from left to right, explores in increasing order in weights according to the computation of connecting branch weights. 40 The S-E enumeration discovers eligible leaf nodes more quickly than that of the F-P enumeration [76]. In case if there were the only refinement, the S-E enumeration would still have to compute the same number of branch and node weights as the F-P strategy. But it is observed that as a leaf node nl is discovered, the search radius can be adaptively reduced to C = √б(nl). Actually after having discovered a point in the search set, I are only interested in locating those points which are even closer to the target than that point. The decoder based on the S-E enumeration has been the current state-of-the art [77-79] by adaptively adjusting the search radius. 4.3 The Schnorr-Euchner Search Order: This search order finds quickly the estimates, ŝ, and reduces the search radius. The SE Search ordering performs a depth first search of the tree search by selecting the admissible symbol estimates, ŝm-k+1 at each level k according to an increasing distance from the unconstrained least squares estimate zm-k+1 given in (4.17). This was proposed in [55], [13] and rediscovered in [56]. SE search ordering represents an approach in which at each level, of the search tree first selects the symbol estimate ŝm-k+1 that minimize the metric on the left hand side of (4.14). This approach benefits as the leaf node visited by the algorithm corresponds to the ZF-DFE estimate (referred to as the Babai estimate [13]) of the transmitted message. As the ML metric in (1.4) is fairly small for the ZF-DFE estimate, the search radius will be set to a small value, limits the complexity of the search, even if the initial search radius was taken very large or even infinite. So the complexity of the algorithm when using the SE search ordering is not affected by the initial search radius (assume here that the ZF-DFE is contained within the search sphere) and the problem of selecting an appropriate search radius is eliminated. The initial search radius setting infinitely large makes it possible for the sphere decoder to obtain the ML estimate. In Paper by Fincke and Pohst [44], they considered the case of real valued vectors, matrices and integer symbols. There is a natural ordering of the elements between the lower and upper bound on the admissible symbols, ŝm-k+1 given by (4.14). The natural ordering is commonly referred to as the Pohst strategy in the communications literature [13] ( investigate the branches expanding from a node in Figure4.1 from left to right). However, the adaptive radius update procedure can be applied to this case but the benefit of the radius updates is not as significant. It is recognized in the literature too that the SE ordering strategy is typically far superior to the Pohst strategy [13, 20]. 4.4 An Incremental Radius: The Pohst and SE orderings [55] is searched [20] in depth first way. It is however possible to do this in different ways, see [21] in which every conceivable search procedure is placed into a unified framework and relative benefits of various concepts are discussed. A procedure for the sphere decoder was proposed in [57], see [21] in which the equivalence between this one and stack decoder [58] is emerged where as initialization of the root node is done like other procedures. But instead of searching tree in depth first fashion, the nodes in the tree are visited in the increasing order subject to the criterion on the left hand side of (3.18).This procedure will visit the smallest set of all the search procedure to get the guaranteed one leaf node at least. The ML decision [57, 41 21] is obtained by the procedures of search. The set of nodes generated in this process can be easily shown that these remain the same set of nodes. These would be visited by the sphere decoder employing a certain search radius fixed. This procedure is called as the increasing radius IR which may be viewed as the sphere decoder where the radius is incremented to the tangent of the objective value of the searched node. In this case actually the sphere radius has conceptual idea rather than a pruning criteria and the sphere decoder term is not leading properly. The penalty here is that the increase in complexity is associated in finding the next node to be searched. These procedures are possibly implemented without storing the search tree. It is not possible in increasing radius IR as there is at least the part of the tree or a list of active nodes [21] must be stored in the memory. Hence IR procedure takes time complexity for the complexity of space. Future research remains to be proved as how the size of list of IR sphere decoder grows with the size of problem. 4.5 Search Algorithms: Adopting an approach to the problem in obtaining the estimate ŝ, is the consideration of the ML detection problem. But instead of searching the entire set given by Sm only limit to some subset of Sm particularly: ŝ= argmin ś✁A||y -Hś||2 (4.8) where (A  Sm and |A|  |Sm|). In this case A depends on y and H. Transmitted message, s could not belong to A with non-zero probability for all s  Sm unless A = Sm. The value of A is explained implicitly by the algorithm that takes y and H as inputs and generates a sequence of candidates, ŝk for k = 1, . . . ,K, as are evaluated on the basis of the ML metric. Considering from point of view, the set of possible vectors in Sm finds the detector to obtain estimate, ŝ. Clearly the error probability is limited by probability that A consists of the transmitted symbol and the complexity [51,52,53,63] is determined by the number of candidates, K, visited in the search as well as the complexity to get the next candidate in the sequence. Detector A always contains the ML estimate, ŝML which may be the search in as the partial search does not imply sub-optimally in terms of error of probability. In this chapter the sphere decoder is an example of the implementation. Other suggestion of detectors may be described over the possible set of the transmitted messages Sm. Examples are given by the Tabu search [39], the SAGE algorithm [40], and genetic algorithms [41]. There is another approach to perform a local search around some given, as the sub-optimal, estimate, ŝ [42]. 4.6 Description of Depth-first stack-based sequential Sphere decoding algorithm: Depth-first stack-based sequential decoding algorithm uses a decoding tree of m+1 levels where each node has 2*admissible_solution children. At each stage, the node under consideration is expanded if its weight is less than the squared distance to nearest 42 currently known lattice point. This distance threshold is initially set to infinity. Because it is a depth-first traversal, I expand a node by computing its first child. If it is a leaf node, clearly it cannot be further expanded. In this case, I will have found a closer lattice point than that previously known. Therefore I can adaptively reduce the distance threshold to reflect this new discovery. If the weight of the node under consideration is larger than this distance threshold, then the current search path is terminated because it cannot possibly lead to a closest lattice point. Upon path termination, the next node to be considered is the next sibling of its parent. If admissible_solution = 0, I do not apply (rectangular, or any) boundary control. In other words, optimal_det behaves as a lattice decoder. For more sophisticated operation, admissible_solution may also be a vector of length m. Then each node at the beginning of stage j in the tree, where the root node is at the beginning of stage m and the leaf nodes are found at the end of stage 1, has 2*admissible_solution(j) children. Equivalently, symbol optimal_solution(j) is drawn from {-admissible_solution(j)+1,..,-1,0,1,..,admissible_solution(j)}.If cplx = 1, I consider a tree of 2*m+1 levels with each node still having 2*admissible_solution children. In addition, either admissible_solution should be a complex-valued vector, or imag(admissible_solution) will be taken to be equal to real(admissible_solution), i.e., a square QAM constellation will be assumed by default. If either lattice reduction assistance or MMSE pre-processing are desired, these operations should also be applied in advance of calling optimal_det. 4.7 The Computational Efficiency of Sphere Decoding: There is one of the main difficulties faced when directly comparing the computation times of different sphere decoders, for example in terms of floating-point operations, is the implementation dependent nature of this comparison. Here, I break down the operations performed by SD into three categories: expanding nodes, determining the next node to expand, and maintaining a node list. I can say that all computations involved in sphere decoding can be grouped into one of these categories. In order to provide a fair comparison, the computation time required for a single node expansion must be fixed as it should be equally optimized for all of the decoders being compared. Thus, I propose to evaluate and compare the computational performance [44,13,15,64] of the SD in a theoretical framework. I assume that this is an important characteristic for distinguishing between different decoding algorithms, and start my study of this quantity by providing a lower bound on its value. 43 Chapter 5 Simulation Result 5.1 System channel model: The designed OFDM transceiver including Sphere Detection is considered operating with different QAM modulation. The full block diagram for the implemented system channel model is shown in figure 5.1. With the transceiver structure in figure 5.1 the different parts of the system are easily configurable and adaptable for parameters changes. The performance of the designed system depicted in fig 5.2 to 5.4 is evaluated by AWGN channel model for different QAM modulation including sphere detection. The Matlab simulator is constructed using a main programme holding all functions that call all parts including the transmitter and receiver models, whereas the algorithm for Sphere detection are located in a different file called optimal_det. In order to plot the BER vs. SNR for different scenarios, firstly, the bit stream is generated randomly as an input to the simulator and then it is transmitted through the implemented system. Afterwards, at the end of the simulator I compute the BER curve. This operation has been repeated several times over different values of SNR. The achieved plotted performance is compared with the theoretical performance in order to verify the correctness of the system results. Figures 5.2, 5.3, and 5.5 show the BER curves for the whole system which is depicted in fig 5.1 used for each modulation scheme i.e. QPSK, 16QAM, and 64QAM compared with the AWGN channel model. The simulations were conducted over a Additive White Gaussian Noise (AWGN), m transmit and m receive antennas. The decoders were tested by theoretical, simulated and simulated with SNR loss compensation curves for any QAM modulation technique. The experimental setup is described in more detail in fig 5.1. Among of all M-ary QAM schemes, QPSK is always has better performance in terms of Simulated curve but each symbol carries less data than that higher-order modulations does. For higher modulation schemes the SNR required for adequate operation is higher than that of QPSK. The simulated performance has more bit error rates comparing with theoretical curves even though M-QAM has higher data rates than that of QPSK. The bit error rate also increases for higher modulation with the number of bits. The intersymbol interference (ISI) and intercarrier interference (ICI) within an OFDM symbol can be avoided with a small loss of transmission energy using the concept of a cyclic prefix. The insertion of a silent guard period between successive OFDM symbols would avoid ISI in a dispersive environment but it does not avoid the loss of the subcarrier orthogonality. This problem is solved with the introduction of a cyclic prefix. This cyclic prefix both preserves the orthogonality of the subcarriers and prevents ISI between successive OFDM symbols. Therefore, equalization at the receiver is very simple. This often motivates the use of OFDM in wireless systems .First, the length of the cyclic prefix should be chosen to be a small fraction of the OFDM symbol length to minimize the loss of SNR. Because the size of the cyclic prefix is directly related to the length of the OFDM symbol or, equivalently, the number of subcarriers.The disadvantage of the cyclic prefix insertion is that there is a reduction in the Signal to Noise Ratio due to a lower efficiency by duplicating the symbol. The SNR loss is given by 44 SNRloss=- l0log10(S/(S+ Tcp))…………………………………….5.1 Where S is the length of transmitted OFDM fft symbol and Tcp is the length of cyclic prefix. To minimize the loss of SNR, the CP should not be made longer than necessary to avoid ISI and ICI. For larger Eb/N0 values the gap between the theoretical and simulated curve increases significantly for higher modulations due to SNR loss, as the remaining equalization error becomes more significant. A loss of SNR due to the Cyclic Prefix insertion directly influence the achievable bit error rate (BER) regarding Eb/N0. However, in the BER region that is significant for most transmission systems, the system channel model performs comparable or even better than conventional transmission system, while avoiding the overhead in SNR function. Redom data generat or reshapi ng Mappin g Modula tion Serial to parallel convers ion FFT Pilot insertio n cyclic prefix insertio n Parallel to serial convers ion AWGN Demod ulation Demap ping Sphere detectio n Reshapi ng Serial convers ion Pilot removal Frequency domain transformat ion Bit Error Calculat ion Figure 5.1: System channel model block diagram. 45 Cyclic prefix removal Serial to parallel data conversi on 5.2 System parameters for performance analysis and results: In the simulator, 20 packets of data were passed consecutively through the system channel model in which each time code word bits were passed through sphere detector. Each packet contains 5200*m bits of data where m depends on modulation scheme. To analyze the performance and the results of the designed system channel model that is depicted in figure 5.1, 20 dB of EbNo is used for theoretical , simulated and simulated with SNR loss compensation curves. The length of cyclic prefix is 16 where as the length of fft symbol is 64 having 52 subcarriers for each QAM modulation technique. 5.2.1 Performance using QPSK modulation: Figure 5.2 respectively below shows the transceiver performance including sphere detection in terms of bit error rate (BER) after running the simulator using QPSK modulation scheme. In that output figure, both simulated and simulated with SNR loss compensation curves are plotted on the theoretical curve as the SNR and compensated SNR loss are same. The best performance is obtained comparing the result with the theoretical curve. One observable fact is that after 10 dB EbNo, the bit error rate is same for the remaining EbNo. After passing the data through the several SNR, the obtained bit error rate is within the range of .09 to .0003. . OFDM BER CURVE 0 10 Simulated curve Snr loss compensation curve Theoritical curve -1 10 -2 BER 10 -3 10 -4 10 0 2 4 6 8 10 12 Eb/No (dB) 14 16 18 20 Figure 5.2: Performance analysis using QPSK modulation. 46 5.2.2 Using 16QAM modulation: Figure 5.3 illustrates the performance of system in terms of theoretical, simulated and simulated with SNR loss compensation curves representing BER vs. SNR over AWGN channel model. After observation of the output figure it is clearly noticeable that the SNR loss gap between theoretical and the simulated curve increases comparatively higher than that of previous execution after 5 EbNo db due to snr loss . According to the equation 5.1, the simulated SNR loss is compensated. In the simulated with SNR loss compensated curve, a better performance is obtained than that of simulated curve. The bit error rate ranges with in .2 to .0004. OFDM BER CURVE 0 10 Simulated curve Snr loss compensation curve Theoritical curve -1 10 -2 BER 10 -3 10 -4 10 0 2 4 6 8 10 12 Eb/No (dB) 14 16 18 20 Figure 5.3: Performance analysis using 16-QAM modulation. 5.2.3 Using 64-QAM modulation: Figures 5.4 shows the BER vs. SNR respectively, for the OFDM transceiver performance along with Sphere detection using 64QAM modulation scheme. A significant SNR loss gap is obtained for the 64-QAM modulation technique comparing with the theoretical output after 10 dB EbNo execution. The SNR loss of simulated curve is compensated according to the equation 5.1. After compensating this SNR loss, the simulated with SNR loss compensation curve is lying on the theoretical curve which 47 indicates the better performance comparing to simulated curve. The bit error rate of the simulated curve is with in the range of .3 to .006. OFDM BER CURVE 0 10 Simulated curve Snr loss compensation curve Theoritical curve -1 10 -2 BER 10 -3 10 -4 10 0 2 4 6 8 10 12 Eb/No (dB) 14 16 18 Figure 5.4: Performance analysis using 64-QAM modulation. 48 20 Chapter 6 Conclusion OFDM is shown to be an adequate modulation technique for the future generation systems. Hence LTE that is based on OFDM, is expected to be deployed by many mobile operators in the near future. Studying the feasibility of the promising new technology OFDM by means of simulations is the main aim behind this work. It also highlights and discusses the different parts of the implemented transceiver chain. The overall performance of the implemented transceiver is given by evaluating the achieved SIMULATED BER with the theoretical one. For the future, the implemented Matlab simulator is adjustable and can be easily reconfigured for future research, for instance by considering other transmission parameters and working on other frequency spectrums. The modifications can easily take place inside the implemented simulator and to evaluate the performance of the OFDM over different spectrum allocations. In this report I have presented a generic framework for the efficient sequential decoding algorithm .Within my framework, the problem of boundary control is handled naturally , alongside the decoding process, by means of distance threshold which is based on a closer lattice point than that previously known. Detection ordering and search radius make a statement that a large class of sphere decoder algorithms is included in that purpose. This is proven in case of detection ordering that the dependency on y in sphere decoding is a lot. Maximum eigen value of HHH will converge to some finite non random limit as m approaches to infinity in the case of channel matrix. Suboptimal implementation with low complexity is future research as the exponential complexity is present in the optimal sphere decoder. Sphere decoder has complexity not only in the worst case but in a probabilistic and every sense as well. This approach is given in [65, 66] as the fixed complexity sphere decoder with low error probability at high SNR and a ✂ sub exponential complexity of O(|S| m). 49 Appendix: Pseudocode for the decoder: A complete detailed pseudo code descriptions of the Sphere decoding algorithm is presented below. Assuming that the (square) upper triangular transform matrices R and P, arising from the QR factorizations of the code lattice generator G, respectively, and the border nodelist Nb are available throughout as global variables. The node data structure is defined as an 11-tuple comprising its . weight σ in R ≥0, . parent dimension d′ in In, . parent residual target vector ỹ′ in Rd-, . associated vector of applied constraint values ž in Zm′-d+1 , . position with respect to its siblings q in Z >0, . the weight of its parent node σ′ in R ≥0 . the constraint value of its previous sibling x- . in R , . parent residual translation vector ũ′ in Rd-, . parent residual squared radius D′ in R ≥0, . the lower bound of its candidate range xmin in Z , and . the upper bound of its candidate range xmax in Z . However, instead of maintaining the nodes in a heap (or other data structure of choice), this algorithm expands these recursively. I assume that the functions are appropriately modified to return the computed child and sibling node data structures to Recursive Expand-L. Algorithm Schnorr-Euchner Adaptive Decoder -L(v H G u D ) Input:, The channel matrix H, the target vector v the lattice generator matrix G, its translation vector u, and the squared radius D of the spherical code shaping region. Output: The radius C of the optimal search sphere and a vector z* .such that s.= Gz* + u € C and |v – Hs*|2 | ≤ | v- Hs |2 and s € C , where C = (Λ(G) + u) ∩ Ś (0, D). Pre-compute (once per LAST code): Factor code lattice generator matrix 1: (QG , P) ←QR(G) 2:u ←.QGT u Project translation vector onto codeword space 3: xmin ← │(ũm / pmm) - √D/|pmm| │ Compute lower bound of candidate range 4: xmax ← │(ũm / pmm) + √D/|pmm| │ Compute upper bound of candidate range Decode (once per received word): 5: ✄ ☎Q G T (ũ ✆Ps) Offset and project target onto search space 50 Compute root unconstrained value 6: x [0]← v_m / r_ mm 7: x[1]←FirstValue-L(x[0] , xmin , xmax ) Determine first candidate value 8: σ ←d2 ( v_m , r_mm x [1] ) Compute weight of first child of root node 9: RecursiveExpand-L(σ , m, v , x [1] , 1, 0, x [0] , u , D, xmin , xmax ) Expand first child of root 10: Return z *= z and C .= √ÿ Function 2 FirstChild(σ, d′ , ỹ′, ž, ũ′, D′ ) Input: The parent residual target ỹ, the weight σ , the parent dimension d′ , ′ and the constraint values ž of the node and the residual translation vector ũ′ as well as residual squared radius D′ of its parent. Output: The border nodelist Nb (global variable). 1: d← d′-1 Determine current residual dimension 2: ũ←( ũ′ pd′d′ - ž )\ d′ Compute current residual translation vector 3: D←D′ - d2( ũ′d′ ,pd′d′ž1) Compute current residual squared radius Compute lower bound of candidate range 4: xmin ,c ← | ũd/ pdd -√D/|pdd | 5: xmax, c ← | ũd/ pdd +√D/|pdd | Compute upper bound of candidate range then If there are any children 6: if xmax,c ≥ xmin,c Compute current residual target 7: ỹ ←(ỹ′ - r-d′ ž1)\ d′ 8: x[0]← ỹd /r-dd Compute current unconstrained value 9: x [1]←FirstValue-L(x [0] , xmin , xmax ) Determine first candidate value 10: σc ← σ + d2 (ỹ_d, r_dd x[1] ) Compute new child node components 11: žc ← │x [1] │ z 12: xc ←x[0] 13: Insert ( σc , d , ỹ, žc , 1, σ , xc¯ , ũ, D, xmin ,c , xmax ,c ) into Nb Put child on border 14: end if Function 3 FirstValue(x[0] , xmin , xmax ) Input: The lower and upper bounds xmin and xmax of the candidate range of the node and the unconstrained target x [0]. Output: The constraint value x [1] of the first child node. 1: x[1]←Round(x[0]) 2: if x[1] > xmax then 3: x[1]←xmax 4: else if x[1] < xmin then 5: x[1]← xmin 6: end if 7: Return x[1] Ensure x[1] € [xmin , xmax ] 51 Function 4 NextSibling( d′, ỹ′, ž ,q, σ′, x - ,ũ′, D′, xmin , xmax ) Input: The residual translation ũ′ and residual squared radius D′ of its parent as well as the lower and upper bounds xmin and xmax of its candidate range, the constraint values ž and the position q of the node, the weight .of its parent, the constraint value x of its previous sibling, The parent dimension d′, the parent residual target ỹ′. Output: The border nodelist Nb (global variable). then If there are more siblings 1: if q ≤xmax-.xmin 2: x[q]← z1 Get current constraint value 3: x [q+1]←NextValue-L(q, x[q] , x -, xmin , xmax ) Determine next candidate value 4: σs ← σ′+ d2(ỹ′_d′, r_d′d′ x[q+1] ) Compute new sibling node components 5: žs ← │x [q+1]¡ │ žl/2 6: qs←q + 1 7: xs ←x[q] 8: Insert ( σs, d′ , ỹ′, žs , qs , xs¯ , ũ′, D′, xmin , xmax ) into Nb Put sibling on border 9: end if Function 5 NextValue(q, x [q] , x [q -1] , xmin , xmax ) Input: The lower and upper bounds xmin and xmax of its candidate range along with the position q and the constraint value x[q] of the node and its previous sibling x- . Output: The constraint value of the next sibling node, x [q+1]. 1: x[q+1] ← x[q] – q .Sign (x[q] -x[q -1] ) 2: if x [q+1] > xmax then 3: x [q+1]←xmax -q 4: else if x [q+1] < xmin then 5: x [q+1]←xmin + q 6: end if 7: Return x [q+1] Ensure x [q+1] € [xmin , xmax ] Function 6 RecursiveExpand (σ, d′, ỹ′, ž, q, σ′, x - , ũ′ , D′, xmin , xmax ) Input: A node data structure along with the current search radius C (global variable). Output: The current search radius C (global variable) along with the current best solution vector z (global variable). 1: if d′ > 1 then Expand node 2: nc ← FirstChild(σ, d′, ỹ′, ž, q, ũ′ , D′) 3: if σ (nc) < C2 then 4: RecursiveExpand(ns) 5: end if 52 6: ns←NextSibling(d′, ỹ′, ž, q, σ′, x - , ũ′ , D′, xmin , xmax ) 7: if σ (ns) < C2 then 8: RecursiveExpand(ns) 9: end if 10: else if σ < C2 then Smaller weight leaf node found 11: C←Sqrt (σ ) 12: z ← ž 13: end if 53 Bibliography 1. I.E. Telatar. Capacity of multi-antenna gaussian channels. European Transantions on Telecommunication, 10(6):585–596, December 1999. 2.G. J. Foshini and M. J. Gans.On limits of wireless communications in a fading environment when using multiple antennas. IEEE Personal Communications, 6(3):311– 335, March 1998. 3. D. Tse and P. Viswanath. Fundamentals of Wireless Communication. Cambridge University Press, 2005. 4. S. N. Diggavi, N. Al-Dhahir, A. Stamoulis, and A. R. Calderbank. Great expectations: The value of spatial diversity in wireless networks. Proceedings of the IEEE, 92(2):219– 270, February 2004. 5. L. Zheng and D. N. C. Tse. Diversity and multiplexing: A fundamental tradeo. in multiple-antenna channels. IEEE Transactions on Information Theory, 49(5):1073–1096, May 2003. 6. P. W. Wolniansky, G. J. Foschini, G. D. Golden, and R. A. Valen- zuela. V-BLAST: An architecture for realizing very high data rates over the rich-scattering wireless channel. In Proc. URSI International Symposium on Signals, Systems and Electronics, ISSSE, 1998. 7. A. Duel-Hallen, J. Holtzman, and Z. Zvonar. Multiuser detection for CDMA systems. IEEE Personal Communications, pages 46–58, April 1995. 8. S. Verdú. Multiuser Detection. Cambridge University Press, 1998. 9. X. Wang and H.V. Poor. Space-time multiuser detection in multipath cdma channels. IEEE Transactions on Signal Processing, 47(9):2356–2374, 1999. 10. G. Ginis and J. M. Cio.. Vectored transmission for digital subscriberline systems. IEEE Journal on Selected Areas in Communications,20(5):1085–1104, June 2002. 11. L.C. Barbosa. Maximum likelihood sequence estimators: a geometric view. IEEE Transactions on Information Theory, 35(2):419–427,March 1989. 12. T. Kailath and H. V. Poor. Detection of stochastic processes. IEEE Transactions on Information Theory, 44(6), October 1998. 13. E. Agrell, T. Eriksson, A. Vardy, and K. Zeger. Closest point search inlattices. IEEE Transactions on Information Theory, 48(8):2201–2214,August 2002. 54 14. H. Van Trees. Detection, Estimation, and Modulation Theory, volume 1. John Wiley and Sons, New York, 1968. 15. S. Ulukus and R. Yates. Optimum multiuser detection is tractable for synchronous cdma using m-sequences. IEEE Communications Letters,2(4):89–91, April 1998. 16. C. Sankaran and A. Ephremides. Solving a class of optimum multiuser detection problems with polynomial complexity. IEEE Transactions on InformationTheory,44(5):19581961,September 1998. 17. C. Schlegel and A. Grant. Polynomial complexity optimal detection of certain multiple-access systems. IEEE Transactions on Information Theory, 46(6):2246–2248, September 2000. 18. W.H. Mow. Maximum likelihood sequence estimation from the lattice viewpoint. IEEE Transactions on Information Theory, 40(5):1591–1600, September 1994. 19. E. Viterbo and J. Boutros. A universal lattice code decoder for fading channels. IEEE Transactions on Information Theory, 45(5):1639–1642, July 99. 20. M. O. Damen, H. El Gamal, and G. Caire. On maximum-likelihood detection and the search for the closest lattice point. IEEE Transactions on Information Theory, 49(10):2389–2401, October 2003. 21. A. D. Murugan, H. E. Gamal, M. O. Damen, and G. Caire. A unified framework for tree search decoding: rediscovering the sequential decoder. IEEE Transactions on Information Theory, 52(3):933– 953,March 2006. 22. M. Ajtai. Generating hard instances of lattice problems. In Proc. ACM symposium on Theory of computing, 1996. 23. R. Lupas and S. Verdú. Linear multiuser detectors for synchronous code-division multiple access channels. IEEE Transactions on Information Theory, 35(1):123–136, January 1989. 24. A. Kapur, C. T. Mullis, and M. K. Varanasi. On the limitation of linear MMSE detection. In Proc. IEEE International Symposium on Information Theory and its Applications, ISITA, 2004. 25. M. K. Varanasi. Decision feedback multiuser detection: a systematic approach. IEEE Transactions on Information Theory, 45(1):219–240,January 1999. 26. N. Prasad and M. K. Varanasi. Analysis of decision feedback detection for MIMO rayleigh-fading channels and the optimization of power and rate allocations. IEEE Transactions on Information Theory, 50(6):1009–1025, June 2004. 55 27. S. Loyka and F. Gagnon. Performance analysis of the V-BLAST algorithm: an analytical approach. IEEE Transactions on Wireless Communications, 3(4):1326– 1337, July 2004. 28. Y. Jiang, M. K. Varanasi, X. Zheng, and J. Li. Performance analysis of V-BLAST at high SNR regime. IEEE Transactions on Wireless Communications, December 2005. Sumbitted. 29. A. Yener, R. D. Yates, and S. Ulukus. Cdma multiuser detection: a nonlinear programming approach. IEEE Transactions on Communications, 50(6):1016–1024, June 2002. 30. W.-K. Ma, T. N. Davidson, K.M. Wong, Z.-Q Luo, and P.-C. Ching. Quasimaximum-likelihood multiuser detection using semi-de.nite relaxation with application to synchronous CDMA. IEEE Transactions on Signal Processing, 50(4):912–922, April 2002. 31. S. Poljak, F. Rendl, and H. Wolkowicz. A recipe for semide.nite relaxation for (0,1)quadratic programming. Journal of Global Optimization, 7(1):51–73, July 1995. 32. H. Wolkowicz, R. Saigal, and L. Vandenberghe, editors. Handbook of Semidefinite Programming. Kluwer Academic Publishers, 2000. 33. S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, 2004. 34. H. Yao and G. W. Wornell. Lattice reduction aided detectors for MIMO communication systems. In Proc. IEEE Global Telecommunications Conference, GLOBECOM, November 2002. 35. C. Windpassinger, L. Lampe, and R. F. H. Fischer. From lattice reduction-aided detection toward maximum-likelihood detection in MIMO systems. In Proc. Wireless, Optical Communication Conference, Ban., AB, Canada, July 2003. 36. C.Windpassinger and R. F. H. Fisher. Low complexity near maximum likelihood detection and precoding for MIMO systems using lattice reduction. In Proc. IEEE Information Theory Workshop, ITW, April 2003. 37. A. K. Lenstra, H. W. Lenstra, and L. Lovasz. Factoring polynomials with rational coe.cients. Mathematische Annalen, 261:515–534, 1982. 38. M. Taherzadeh, A. Mobasher, and A. K. Khandani. LLL reduction achieves the receive diversity in MIMO decoding. IEEE Transactions on Information Theory, 2006. Submitted. 56 39. P. H. Tan and L. K. Rasmussen.A reactive tabu search heuristic for multiuser detection in CDMA.In Proc.IEEE International Symposium on Information Theory, ISIT, 2002. 40. L. B. Nelson and H. V. Poor. terative multiuser receivers for CDMA channels: an EM-basedapproach. IEEE Transactions on Communications, 44(12):1700–1710, December 1996. 41.C. Ergun and K. Hacioglu.Multiuser detection using a genetic algorithm in CDMA communications systems. IEEE Transactions on Communications, 48(8):1374–1383, August 2000. 42. D. J. Love, S. Hosur, A. Batra, and R. W. Heath.Chase decoding for space-time codes. In Proc. IEEE Vehicular Technology Conference,VTC, September 2004. 43. M. Pohst. On the computation of lattice vectors of minimal length,successive minima and reduced bases with applications. ACM SIGSAM Bulletin, 66:181–191, 1981. 44. U. Fincke and M. Pohst.Improved methods for calculating vectors of short length in lattice, including a complexity analysis. AMS Mathematics of Computation, 44(170):463–471, April 1985. 45. W.H. Mow.Maximum likelihood sequence estimation from the lattice viewpoint.In Proc. ICCS/ISITA,November 1992. 46. E. Viterbo and E. Biglieri.A universal lattice decoder. In Proc. 14ème Colloque GRETSI, Juan-les-Pins, France, pages 611–614, September1993. 47. O.Damen, A. Chkeif, and J.-C.Bel.ore.Lattice code decoder for space-time codes. IEEE Communications Letters, 4(5):161–163, May 2000. 48 H. Vikalo and B. Hassibi.Maximum-likelihood sequence detection of multiple antenna systems over dispersive channels via sphere decoding. EURASIP Journal on Applied Signal Processing, 2002(5):525–531,May 2002. 49.L. Brunel and J. Boutros.Lattice decoding for joint detection in direct sequence CDMA systems. IEEE Transactions on Information Theory,49(4):1030–1037, April 2003. 50.B. M. Hochwald and S. Brink. Achieving near-capacity on a multiple-antenna channels. IEEE Transactions on Communications, 51(3):389–399, March 2003. 51.B. Hassibi and H. Vikalo. On the sphere-decoding algorithm i. expected complexity. IEEE Transactions on Signal Processing,53(8):2806– 2818, August 2005. 57 52.B. Hassibi and H. Vikalo.On the sphere-decoding algorithm ii. generalizations, second-order statistics, and applications to communications. IEEE Transactions on Signal Processing, 53(8):2819–2834, August 2005. 53.J. Jaldén and B. Ottersten.On the complexity of sphere decoding in digital communications. IEEE Transactions on Signal Processing,53(4):1474–1484, April 2005. 54.J. Jaldén and B. Ottersten.On the limits of sphere decoding. In Proc.IEEE International Symposium on Information Theory, ISIT, pages 1691–1695, September 2005. 55.C.P. Schnorr and M. Euchnerr. Lattice basis reduction: improved practical algorithms and solving subset sum problems. Mathematical Programming, 66:181–191, 1994. 56. A. M. Chan and I. Lee. A new reduced complexity sphere decoder for multiple antenna systems. In Proc. IEEE International Conference on Communications, ICC, April 2002. 57. W. Xu, Y. Wang, Z. Zhou, and J. Wang. A computationally efficient exact ml sphere decoder. In Proc. IEEE Global Telecommunications Conference, GLOBECOM, 2004. 58. F. Jelinek. A fast sequential decoding algorithm using a stack. IBM Journal of Research and Development, 13:675–685, November 1969. 59. K. Su and I. J.Wassell. A new ordering for e.cient sphere decoding. In Proc. IEEE International Conference on Communications, ICC, May 2005. 60. A. Wiesel, X. Mestre, A. Pagés, and J. R. Fonollosa. E.cient implementation of sphere demodulation. In Proc. IEEE International Workshop on Signal Processing Advances for Wireless Communications, SPAWC, April 2003. 61. G. J. Foschini, G. D. Golden, R. A. Valenzuela, and P. W. Wolniansky. Simplified processing for high spectral efficiency wireless communication employing multi-element arrays. IEEE Journal on Selected Areas in Communications, 17(11):1841–1852, November 1999. 62. B. Hassibi.An efficient square-root algorithm for BLAST. In Proc IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP, 2000. 63. J. A. Thomas T. M. Cover. Elements of Information Theory. Wiley,1991. 64. J. Jaldén and B. Ottersten. An exponential lower bound on the expected complexity of sphere decoding. In Proc.IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP, May 2004. 58 65.L. G. Barbero and J. S. Thompson. Performance analysis of a fixed complexity sphere decoder in high-dimensional MIMO systems.In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP, May 2006. 66. J. Jaldén, L. G. Barbero, B. Ottersten, and J. S. Thompson. Full diversity detection in MIMO systems with a fixed complexity sphere decoder. In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP, 2007. Submitted. 67. 3GPP TR 25.890 V1.0.0, "High Speed Downlink Packet Access UE Radio Transmission and Reception (FDD)", (Release 5), May 2002. 68. 3GPP, “Third Generation Partnership Project (3GPP).” [Online]. Available: http://www.3gpp.org/ 69.Theodore S. Rappaport, A. Annamalai, R. M. Buehrer, and William H. Tranter. Wireless communications: Past events and a future perspective. IEEE Communications Magazine, 40(5):148{161, May 2002. 70. Babak Hassibi and Haris Vikalo. On the sphere decoding algorithm: Part I, The expected complexity. To appear in IEEE Transactions on Signal Processing, 2004. 71. Emanuele Viterbo and Joseph Boutros. A universal lattice code decoder for fading channels. IEEE Transactions on Information Theory, 45(5):1639{1642, July 1999. 72. Negi, R.; and Cioffi, J.; "PILOTTONE SELECTION FOR CHANNEL ESTIMATION IN A MOBILE OFDM SYSTEM", IEEE Transactions on Consumer Electronics, Vol. 44, No. 3, AUGUST 1998 73. 3GPP TR 25.814 V7.1.0, "Physical layer aspects for evolved Universal Terrestrial Radio Access", UTRA (Release 7), 2006. 74. Jan-Jaap van de Beek, Ove Edfors, Magnus Sandell, Sarah Kate Wilson and Per Ola B.rjesson, “On Channel Estimation In OFDM Systems”, In Proceedings of Vehicular Technology Conference (VTC Ô95), vol. 2, pp. 815-819, Chicago, USA, September 1995 75. Robert Sedgewick. Algorithms. Addison-Wesley, 1988. 76. Erik Agrell, Eriksson Thomas, Alexander Vardy, and Kenneth Zeger. Closest point search in lattices. IEEE Transactions on Information Theory, 48(8):2201{2214, August 2002. . 77. Andreas Burg, Moritz Borgmann, Claude Simon, Markus Wenk, Martin Zellweger, and Wolfgang Fichtner. Performance tradeo_s in the VLSI implementation of the sphere decoding algorithm. In IEE 3G Mobile Communication Technologies Conference, October 2004. 59 78.Albert M. Chan and Inkyu Lee. A new reduced-complexity sphere decoder for multiple antenna systems. In IEEE International Conference on Communications, volume 1,pages 460{464, April 2002. 79. Mohamed Oussama Damen, Hesham El Gamal, and Giuseppe Caire. On maximumlikelihood detection and the search for the closest lattice point. IEEE Transactions on Information Theory, 49(10):2389{2402, October 2003. 80. Jan-Jaap van de Beek, Ove Edfors, Magnus Sandell, Sarah Kate Wilson and Per Ola B.rjesson, “On Channel Estimation In OFDM Systems”, In Proceedings of Vehicular Technology Conference (VTC Ô95), vol. 2, pp. 815-819, Chicago, USA, September 1995 www.diva-portal.org/diva/getDocument?urn_nbn_se http://www.essays.se/essay/b2a083f87e/ http://www.cl.cam.ac.uk/research/dtg/publications/public/ks349/Su05B Acronyms CDMA Code Division Multiple Access DFE Decision Feedback FSD Fixed Complexity Sphere Decoder IR Increasing Radius KKT Karush-Kuhn-Tucker (optimality conditions) [BV04] LD-STBC Linear Dispersive Space-Time Block Code LRA Lattice basis Reduction Aided MIMO Multiple-Input Multiple-Output ML Maximum Likelihood MMSE Minimum Mean Square Error MUD Multi-user detection NP Nondeterministic Polynomial PSD Positive Semi-definite PSK Phase Shift Keying QAM Quadrature Amplitude Modulation SD Sphere Decoder SDR Semi-definite relaxation SE Schnorr - Euchner SNR Signal to Noise Ratio V-BLAST Vertical - Bell Labs Layered Space Time ZF Zero-Forcing 60 THE END 61