6.4 Turbo Multiuser Detection with Unknown Interferers


The turbo multiuser detection techniques developed so far assume that the spreading waveforms of all users are known to the receiver. Another important scenario, discussed in Chapter 3, is that the receiver has knowledge of the spreading waveforms of some but not all of the users in a system. Such a situation arises, for example, in a cellular system where the base station receiver knows the spreading waveforms of the in-cell users but not those of the out-of- cell users. In this section we discuss a turbo multiuser detection method that can be applied in the presence of unknown interference, which was first developed in [414].

6.4.1 Signal Model

Consider again the synchronous CDMA signal model (6.27). Here we assume that the spreading waveforms and the received amplitudes of the first graphics/328fig01.gif ( graphics/328fig01.gif < K ) users are known to the receiver, whereas the rest of the users are unknown to the receiver. Since some of the spreading waveforms are unknown, we cannot form the sufficient statistic (6.32). Instead, as done in Chapters 2 and 3, we sample the received continuous-time signal r(t) at the chip rate to convert it to discrete-time signal. The sample that corresponds to the j th chip of the i th symbol is given by

Equation 6.72

graphics/06equ072.gif


The resulting discrete-time signal corresponding to the i th symbol is then given by

Equation 6.73

graphics/06equ073.gif


Equation 6.74

graphics/06equ074.gif


with

graphics/329equ01.gif

where

Equation 6.75

graphics/06equ075.gif


is a Gaussian random variable; n [ i ] ~ N ( , s 2 I N ); s k is the normalized discrete-time spreading waveform of the k th user , with c n,k {+1, “1}; graphics/329fig01.gif ; graphics/329fig02.gif ; and graphics/329fig03.gif .

Denote by graphics/329fig05.gif the matrix consisting of the first graphics/329fig07.gif columns of S . Denote the remaining graphics/329fig07.gif = K graphics/329fig07.gif columns of S by graphics/329fig06.gif . These first graphics/329fig07.gif signature sequences are unknown to the receiver. Let graphics/324fig11.gif be the graphics/329fig07.gif -vector containing the first graphics/329fig07.gif bits of b [ i ], and let graphics/324fig11.gif contain the remaining graphics/329fig07.gif bits. Then we may write (6.74) as

Equation 6.76

graphics/06equ076.gif


Since we do not have knowledge of graphics/329fig06.gif , we cannot hope to demodulate graphics/324fig11.gif . We therefore write (6.76) as

Equation 6.77

graphics/06equ077.gif


where graphics/329fig04.gif is regarded as an interference term that is to be estimated and removed by the multiuser detector before it computes the a posteriori log- likelihood ratios (LLRs) for the bits in graphics/324fig11.gif .

6.4.2 Group -Blind SISO Multiuser Detector

The heart of the turbo group-blind receiver is the soft-input/soft-output (SISO) group-blind multiuser detector. The detector accepts, as inputs, the a priori LLRs for the code bits of the known users delivered by the SISO MAP channel decoders of these users, and produces, as outputs, updated LLRs for these code bits. This is accomplished by soft interference cancellation and MMSE filtering. Specifically, using the a priori LLRs and knowledge of the signature sequences and received amplitudes of the known users, the detector performs a soft-interference cancellation for each user, in which estimates of the multiuser interference from the other known users and an estimate for the interference caused by the unknown users are subtracted from the received signal. Residual interference is suppressed by passing the resulting signal through an instantaneous MMSE filter. The a posteriori LLR can then be computed from the MMSE filter output.

The detector first forms soft estimates of the user code bits as

Equation 6.78

graphics/06equ078.gif


where l 2 ( b k [ i ]) is the a priori LLR of the k th user's i th bit delivered by the MAP channel decoder. We denote hard estimates of the code bits as

Equation 6.79

graphics/06equ079.gif


and denote graphics/330fig01.gif .

In the next step we form an estimate of interference of the unknown users, I [ i ], which we denote by graphics/330fig03.gif . We begin by forming the preliminary estimate

Equation 6.80

graphics/06equ080.gif


where graphics/330fig02.gif and d k [ i ] is a random variable defined by

Equation 6.81

graphics/06equ081.gif


It will be seen that our ability to form a soft estimate for d k [ i ] will allow us to perform the soft interference cancellation mentioned above. Clearly, d k [ i ] can take on one of two values, 0 or 2 b k [ i ]. The probability that d k [ i ] is equal to zero is the probability that the hard estimate is correct and is given by

Equation 6.82

graphics/06equ082.gif


Recall that for b {+1, “1}, the probability that b k [ i ] = b is related to the corresponding LLR by [cf. (6.42)]

Equation 6.83

graphics/06equ083.gif


On substituting b = sign {tanh [ ½ l 2 ( b k )[ i ]} in (6.83), we find that

Equation 6.84

graphics/06equ084.gif


Therefore, d k [ i ] is a random variable that can be described as

Equation 6.85

graphics/06equ085.gif


We now perform an eigendecomposition on G G T / M where graphics/331fig01.gif 1]]. We denote by U u the matrix of eigenvectors corresponding to the graphics/328fig01.gif largest eigenvalues. The span of the columns of U u represents an estimate of the subspace of the unknown users (i.e., the interference subspace). Ideally , that is, when d [ i ] = in (6.80), U u contains the signal subspace spanned by the unknown interference graphics/sbar.gif . To refine our estimate of I [ i ], we project g [ i ] onto U u . The result is

Equation 6.86

graphics/06equ086.gif


Denote graphics/331fig02.gif and graphics/331fig03.gif . Since, ideally, graphics/331fig04.gif we have

Equation 6.87

graphics/06equ087.gif


Now we subtract the interference estimate from the received signal and form a new signal

Equation 6.88

graphics/06equ088.gif


where

Equation 6.89

graphics/06equ089.gif


with

Equation 6.90

graphics/06equ090.gif


For each known user we perform a soft interference cancellation on z [ i ] to obtain

Equation 6.91

graphics/06equ091.gif


where

graphics/331equ01.gif

with graphics/332fig01.gif a soft estimate for d k [ i ], given via (6.85) by

Equation 6.92

graphics/06equ092.gif


Substituting (6.88) into (6.91), we obtain

Equation 6.93

graphics/06equ093.gif


An instantaneous linear MMSE filter is then applied to r k [ i ] to obtain

Equation 6.94

graphics/06equ094.gif


The filter graphics/329fig10.gif is chosen to minimize the mean-square error between the code bit b k [ i ] and the filter output z k [ i ]:

Equation 6.95

graphics/06equ095.gif


where the expectation is with respect to the ambient noise and the interfering users. The solution to (6.95) is given by

Equation 6.96

graphics/06equ096.gif


It is easy to show that

Equation 6.97

graphics/06equ097.gif


where graphics/332fig02.gif . The covariance matrix D [ i ] has the dimensions 2 graphics/328fig01.gif x 2 graphics/328fig01.gif and may be partitioned into four diagonal graphics/328fig01.gif x graphics/328fig01.gif blocks in the following manner:

Equation 6.98

graphics/06equ098.gif


The diagonal elements of D 11 [ i ] are given by

Equation 6.99

graphics/06equ099.gif


Using (6.85), the diagonal elements of D 22 [ i ] are given by

Equation 6.100

graphics/06equ100.gif


where

Equation 6.101

graphics/06equ101.gif


The diagonal elements of D 12 [ i ] and D 21 [ i ] are identical and are given by

Equation 6.102

graphics/06equ102.gif


It is also easy to see that

Equation 6.103

graphics/06equ103.gif


where e k is a graphics/328fig01.gif -vector whose elements are all zero except for the k th element, which is 1. Substituting (6.97) and (6.103) into (6.96), we may write the instantaneous MMSE filter for user k as

Equation 6.104

graphics/06equ104.gif


As before, we make the assumption that the MMSE filter output is Gaussian; we may write

Equation 6.105

graphics/06equ105.gif


where m k [ i ] is the equivalent amplitude of the k th user's signal at the filter output, and h k [ i ] ~ N (0, graphics/381fig10.gif ) is a Gaussian noise sample. Using (6.97) and (6.104), the parameter m k [ i ] is computed as

Equation 6.106

graphics/06equ106.gif


Equation 6.107

graphics/06equ107.gif


where (6.107) follows from (6.97), (6.104), and (6.106).

Finally, exactly the same as (6.64), the extrinsic information, l 1 ( b k [ i ]), delivered by the SISO multiuser detector is given by

Equation 6.108

graphics/06equ108.gif


This group-blind SISO multiuser detection algorithm is summarized as follows.

Algorithm 6.3: [Group-blind SISO multiuser detector ”synchronous CDMA]

  • Given { l 2 ( b k [ i ])}, form soft and hard estimates of the code bits:

    Equation 6.109

    graphics/06equ109.gif


    Equation 6.110

    graphics/06equ110.gif


    Denote

    graphics/334equ01.gif

  • Let

    Equation 6.111

    graphics/06equ111.gif


    Equation 6.112

    graphics/06equ112.gif


    Perform an eigendecomposition on G G T / M ,

    Equation 6.113

    graphics/06equ113.gif


    Set U u equal to the first graphics/328fig01.gif columns of U .

  • For i = 0,1, ..., M “ 1:

    Refine the estimate of the unknown interference by projection:

    Equation 6.114

    graphics/06equ114.gif


    Compute graphics/332fig01.gif according to

    Equation 6.115

    graphics/06equ115.gif


    where a k [ i ] is defined in (6.101). Define

    graphics/334equ02.gif

    Subtract graphics/335fig07.gif [ i ] from r [ i ] and perform soft interference cancellation:

    Equation 6.116

    graphics/06equ116.gif


    where graphics/335fig01.gif .

    Calculate D [ i ], according to (6.99) “(6.102).

    Calculate and apply the MMSE filters:

    Equation 6.117

    graphics/06equ117.gif


    Equation 6.118

    graphics/06equ118.gif


    where graphics/335fig02.gif , graphics/335fig03.gif , and where graphics/335fig04.gif and graphics/335fig05.gif .

    Compute m k [ i ] according to (6.106).

    Compute the a posteriori LLRs for code bit b k [ i ] according to (6.108).

6.4.3 Sliding Window Group-Blind Detector for Asynchronous CDMA

It is not difficult to extend the results of Section 6.4.2 to asynchronous CDMA. The received signal due to user k (1 k K ) is given by

Equation 6.119

graphics/06equ119.gif


where t k is the delay of the k th user's signal, { c j,k } graphics/335fig06.gif is a signature sequence of graphics/335fig08.gif 1's assigned to the k th user, and y ( t ) is a normalized chip waveform of duration T c = T/N . The total received signal, given by

Equation 6.120

graphics/06equ120.gif


is match-filtered to the chip waveform and sampled at the chip rate. The n th matched-filter output during the i th symbol interval is

Equation 6.121

graphics/06equ121.gif


Substituting (6.119) into (6.121), we obtain

Equation 6.122

graphics/06equ122.gif


where graphics/336fig01.gif . Then

Equation 6.123

graphics/06equ123.gif


Denote

Equation 6.124

graphics/06equ124.gif


and for j = 0, 1, ..., I k “1,

Equation 6.125

graphics/06equ125.gif


Then

Equation 6.126

graphics/06equ126.gif


By stacking graphics/336fig02.gif successive received sample vectors, we define

Equation 6.127

graphics/06equ127.gif


Equation 6.128

graphics/06equ128.gif


where graphics/337fig01.gif . Then we can write the received signal in matrix form as

Equation 6.129

graphics/06equ129.gif


Define the set of matrices graphics/337fig02.gif such that graphics/337fig11.gif is the graphics/337fig12.gif matrix composed of columns jK + 1 through jK + graphics/328fig01.gif of the matrix H . We define the matrix graphics/337fig04.gif graphics/337fig06.gif . The size of graphics/337fig03.gif is N I x graphics/328fig01.gif (2 I - 1). We denote by graphics/337fig05.gif the matrix that contains the remaining graphics/328fig01.gif (2 I - 1) columns of H . We define graphics/337fig07.gif [ i ] and graphics/337fig08.gif [ i ] by performing a similar separation of the elements of b [ i ]. Then we may write (6.129) as

Equation 6.130

graphics/06equ130.gif


This equation is the asynchronous analog to (6.76). We can obtain estimates of graphics/337fig10.gif with straightforward modifications to Algorithm 6.3.

Simulation Examples

We next present simulation results to demonstrate the performance of the proposed turbo group-blind multiuser receiver for asynchronous CDMA. The processing gain of the system is seven and the total number of users is seven. The number of known users is either two or five, as noted on the figures. The spreading sequences are randomly generated and the same sequences are used for all simulations. All users employ the same rate- ½, constraint-length-3 convolutional code (with generators g 1 = [110] and g 2 = [111]). Each user uses a different random interleaver, and the same interleavers are used in all simulations. The block size of information bits for each user is 128. The maximum delay in symbol intervals is 1. All users use the same transmitted power and the chip pulse waveform is a raised cosine with roll-off factor 0.5.

Figure 6.11 illustrates the average bit-error-rate performance of the known users for the group-blind turbo receiver and the conventional turbo receiver discussed in Section 6.3 for the first four iterations. The number of known users is five. For the sake of comparison, we have included plots for the conventional turbo receiver when all of the users are known. The three sets of plots in this figure are denoted in the legend by "GBMUD," "TMUD," and "ALL KNOWN," respectively. Note that the curves for the first iteration are identical for GBMUD and TMUD. Hence we have suppressed the plot of the first iteration for TMUD, to improve clarity. Notice that iteration does not significantly improve the performance of the conventional turbo receiver, whereas the group-blind receiver provides significant gains through iteration at moderate and high signal-to-noise ratios. We can also see that the use of more than three iterations does not provide significant benefits.

Figure 6.11. Performance of a group-blind iterative multiuser receiver with five known users. Curves denoted GBMUD are produced using a turbo group-blind multiuser receiver and those denoted TMUD are produced using a standard turbo multiuser receiver. Also included are plots for TMUD when all users are known.

graphics/06fig11.gif

In Fig. 6.12, the number of known users has been changed to two. As we would expect, there is performance degradation for both conventional and group-blind turbo receivers. In fact, the conventional receiver gains nothing through iteration for this scenario because there are now five users whose interference is simply ignored. It is also apparent that the group-blind turbo receiver will not be able to mitigate all of the interference of unknown users, even for a large number of iterations. This is due, in part, to the use of an imperfect interference subspace estimate in the SISO group-blind multiuser detector.

Figure 6.12. Performance of a group-blind iterative multiuser receiver with two known users. Curves denoted GBMUD are produced using a turbo group-blind multiuser receiver and those denoted TMUD are produced using a standard turbo multiuser receiver. Also included are plots for TMUD when all users are known.

graphics/06fig12.gif



Wireless Communication Systems
Wireless Communication Systems: Advanced Techniques for Signal Reception (paperback)
ISBN: 0137020805
EAN: 2147483647
Year: 2003
Pages: 91

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net