6.7 Turbo Multiuser Detection in Space-Time Block-Coded Systems


The recently developed space-time coding (STC) techniques [350] integrate the methods of transmitter diversity and channel coding and provide significant capacity gains over traditional communication systems in fading wireless channels. STC has been developed along two major directions: space-time block coding (STBC) and space-time trellis coding (STTC). The common features of STBC and STTC lie in their realizations of spatial diversity (i.e., both methods transmit a vector of complex code symbols simultaneously from multiple transmitter antennas). Their differences, on the other hand, lie in their realizations of temporal diversity: In STBC, the temporal constraint is represented in matrix form; whereas in STTC, the temporal constraint is represented in the form of a trellis tree, which is akin to the trellis-coded modulation (TCM) code.

From the coding perspective, the single- user performance of STBC and STTC has been studied in [476, 477], and some code design criteria have been developed. However, in wireless communication systems, sharing the limited radio resources among multiple users is inevitable. Indeed, the emerging wireless systems with multiple transmitter and receiver antennas enable a new dimension for multiple accessing: space-division multiple access (SDMA) [492], which when employed with the more conventional TDMA or CDMA techniques, can substantially increase system capacity. However, if not properly ameliorated, the presence of multiuser interference can significantly degrade receiver performance as well as system capacity. Therefore, the development of efficient detection and decoding techniques for multiuser STC systems ( illustrated in Fig. 6.21) is the key to bringing STC techniques into the practical arena of wireless communications. Research results along this direction first appeared in [349, 476], where some techniques for combined array processing, interference cancellation, and space-time decoding for multiuser STC systems were proposed.

Figure 6.21. Multiuser wireless communication system employing multiple transmitter and receiver antennas. There are K users in the system, each user employing N transmitter antennas. At the receiver side, there are M receiver antennas.

graphics/06fig21.gif

In this and the following sections we discuss turbo receiver structures for joint detection and decoding in multiuser STC systems, based on the techniques developed in previous sections. Such iterative receivers and their variants, which were first developed in [288], are described for both STBC and STTC systems. During iterations, extrinsic information is computed and exchanged between a soft multiuser demodulator and a bank of MAP decoders to achieve successively refined estimates of the users' signals. Further developments of low-complexity turbo structures for multiuser STTC systems are given in [217].

6.7.1 Multiuser STBC System

The transmitter end of a multiuser STBC system is shown in Fig. 6.22. The information bit stream for the k th user, { d k [ n ]} n , is encoded by a convolutional encoder; the resulting convolutional code-bit stream { b k [ i ]} i is then interleaved by a code-bit interleaver. After interleaving, the interleaved code-bit stream is then fed to an M -PSK modulator , which maps the binary bits into complex symbols { c k [ l ]} l , where graphics/357fig01.gif , and W C is the M -PSK symbol constellation set ( M = W C ). The symbol stream { c k [ l ]} l , is partitioned into blocks, with each block consisting of N symbols. Due to the existence of the interleaver, we can ignore the temporal constraint induced by the outer convolutional encoder and assume that the set { c k [ l ]} l contains independent symbols. Hence, from the STBC decoder's perspective, we need only consider one block of symbols in the code symbol stream: the code vector graphics/357fig02.gif .

Figure 6.22. Transmitter structure for a multiuser STBC system.

graphics/06fig22.gif

STBC was first proposed in [12] and was later generalized systematically in [476]. Following [476], the k th user's STBC is defined by a P x N code matrix graphics/357fig03.gif , where N denotes the number of transmitter antennas or the spatial transmitter diversity order, and P denotes the number of time slots for transmitting an STBC code word or the temporal transmitter diversity order. Each row of graphics/357fig03.gif is a permuted and transformed (i.e., negated and/or conjugated) form of the code vector c k . An STBC encoder takes as input the code vector c k and transmits each row of symbols in graphics/357fig03.gif at P consecutive time slots. At each time slot, the symbols contained in an N -dimensional row vector of graphics/357fig03.gif are transmitted through N transmitter antennas simultaneously.

As a simple example, we consider a particular user employing a 2 x 2 STBC (i.e., P = 2, N = 2). Its code matrix graphics/358fig02.gif is defined by

Equation 6.184

graphics/06equ184.gif


The input to this STBC is the code vector c = [ c [1] c [2]] t . During the first time slot, the two symbols in the first row of graphics/358fig02.gif (i.e., c [1] and c [2]) are transmitted simultaneously at the two transmitter antennas; during the second time slot, the symbols in the second row of graphics/358fig02.gif (i.e., “ c [2] * and c [1]*) are transmitted.

We assume a flat-fading channel between each transmitter “receiver pair. Specifically, denote a m,n as the complex fading gain from the n th transmitter antenna to the m th receiver antenna, where a m,n ~ N c (0, 1) is assumed to be a zero-mean circularly symmetric complex Gaussian random variable with unit variance. It is also assumed that the fading gains remain constant over an entire signal frame, but they may vary from one frame to another.

In general, we consider an STBC system with K users, each employing N transmitter antennas. At the receiver side, there are M receiver antennas. In this case, the received signal can be written as

Equation 6.185

graphics/06equ185.gif


In (6.185), graphics/360fig01.gif m = 1,2, ..., M , consists of the received signal from time slots 1 to P , at the m th receiver antenna; H k , k = 1, 2, ..., K, is the channel response matrix for the k th user, as explained below; graphics/360fig02.gif is the code vector for the k th user; and graphics/360fig03a.gif graphics/360fig03b.gif contains the additive Gaussian noise samples from time slots 1 to P at the m th receiver antenna.

As a simple example, consider a single-user ( K = 1) STBC system with two ( N = 2) transmitter antennas and M receiver antennas, employing the code matrix g 1 in (6.184), the received signal at the m th receiver antenna for this single user can be written as

Equation 6.186

graphics/06equ186.gif


For notational convenience, we write (6.186) in an alternative form by conjugating r m [1]:

Equation 6.187

graphics/06equ187.gif


We can see that graphics/361fig01.gif contains information not only of the channel response related to the m th receiver antenna, but also the code constraint of the STBC graphics/358fig02.gif . Finally, by stacking all the r m in (6.187), we obtain

Equation 6.188

graphics/06equ188.gif


The signal model in (6.188) can easily be extended to the general model (6.185) of a K -user P x N STBC system, in which each user employs the graphics/358fig01.gif code defined in [476]. The analogy between this multiuser STBC signal model and the synchronous CDMA signal model (6.74) is evident. Note that to effectively suppress the interfering signals in model (6.185), the size of the receiver signal r should be larger than the number of symbol to be decoded (i.e., MP NK ).

6.7.2 Turbo Multiuser Receiver for STBC System

The iterative receiver structure for a multiuser STBC system is illustrated in Fig. 6.23. It consists of a soft multiuser demodulator, followed by K parallel MAP convolutional decoders. The two stages are separated by interleavers and deinterleavers. The soft multiuser demodulator takes as input the signals received from the M receiver antennas and the interleaved extrinsic log- likelihood ratios (LLRs) of the code bits of all users { l 2 ( b k [ i ])} i;k (which are fed back by the K single-user MAP decoders), and computes as output the a posteriori LLRs of the code bits of all users, { L 1 ( b k [ i ])} i;k . The MAP decoder of the k th user takes as input the deinterleaved extrinsic LLRs of the code bits { l 1 ( graphics/361fig02.gif [ i ])} i from the soft multiuser demodulator and computes as output the a posteriori LLRs of the code bits { L 2 ( graphics/361fig03.gif [ i ])} i , as well as the LLRs of the information bits { D 2 ( graphics/361fig02.gif [ n ])} n . We next describe each component of the receiver in Fig. 6.23.

Figure 6.23. Iterative receiver structure for a multiuser STBC system.

graphics/06fig23.gif

Soft Multiuser Demodulator

The soft multiuser demodulator is based on the technique described in Section 6.3.3. First, a soft estimate graphics/363fig01.gif [ l ] of the k th user's l th code symbol c k ( l ) is formed by

Equation 6.189

graphics/06equ189.gif


where W c is the set of all code symbols. At the first iteration, no prior information about code symbols is available; thus code symbols are assumed to be equiprobable [i.e., P (c k [ l ] = C i ) = 1/ W c ]. In subsequent iterations, the probability P (c k [ i ] = C i ) is computed from the extrinsic information delivered by the MAP decoder, as will be explained later [cf. (6.204)].

For the K -user STBC system (6.185), define an NK -dimensional soft code vector

graphics/363equ01.gif

The basic idea is to treat every element in graphics/363fig02.gif as a virtual user , and therefore there are a total of NK virtual users in the system (6.185). Viewing it this way, the model (6.185) is similar to the synchronous CDMA signal model treated in Section 6.3.3. Henceforth in this section, the notation k [ l ] is used to index a virtual user. Define

Equation 6.190

graphics/06equ190.gif


In (6.190), e k [ l ] is an NK -vector of all zeros, except for the "1" element in the corresponding entry of the k [ l ]th virtual user. That is, graphics/363fig01.gif [ l ] is obtained from graphics/363fig02.gif by setting the k [ l ]th element to zero.

Subtracting the soft estimate of the interfering signals of other virtual users from the received signal r in (6.185), we get

Equation 6.191

graphics/06equ191.gif


Equation 6.192

graphics/06equ192.gif


As before, to further suppress the residual interference in graphics/363fig03.gif , we apply an instantaneous linear minimum mean-square error (MMSE) filter to graphics/363fig03.gif . The linear MMSE weight vector w k [ l ] is chosen to minimize the MSE between the transmitted symbol c k [ l ] and the filter output:

Equation 6.193

graphics/06equ193.gif


Using (6.191) and assuming that the M -PSK symbol c k [ l ] is of unit energy (i.e., c k [ l ] 2 = 1) and E{ n n H } = s 2 I M P , we have

Equation 6.194

graphics/06equ194.gif


Equation 6.195

graphics/06equ195.gif


with

Equation 6.196

graphics/06equ196.gif


Using (6.193) “(6.196), the instantaneous MMSE estimate for c k [ l ] is then given by

Equation 6.197

graphics/06equ197.gif


The instantaneous MMSE filter output is modeled by an equivalent additive white Gaussian noise channel having c k [ l ] as its input symbol. The output of this filter can then be written as

Equation 6.198

graphics/06equ198.gif


with

Equation 6.199

graphics/06equ199.gif


Equation 6.200

graphics/06equ200.gif


Note that m k [ l ] and graphics/344fig01.gif [ l ] are real numbers . Equations (6.198) “(6.200) give the probability distribution of the code symbol graphics/364fig02.gif [ l ], based on which the a posteriori probability of the code bits are computed, as discussed below.

From the discussion above, the major computation involved in the soft multiuser demodulator is the MP x MP matrix inversion, graphics/364fig04.gif . As before, this can be done recursively by making use of the matrix inversion lemma. As a result, the computational complexity of the proposed soft multiuser demodulator per user per symbol is graphics/325fig01.gif [( MP ) 3 / NK ]. (Recall that M is the number of receiver antennas, N is the number of transmitter antennas, P is the number of time slots in an STBC code word, and K is the number of users.)

Computing a posteriori Code-Bit LLRs

The convolutional code is chosen as the outer channel code in the system considered here (Fig. 6.22). First we need to compute the a posteriori LLRs of the code bits based on the estimated code symbols given by the soft multiuser demodulator. Since each user decodes its convolutional code independently, henceforth we drop the subscript k , the user index, to simplify the notation.

Every complex symbol c [ l ] can be represented by a J -dimensional binary bit vector, [ b [ l , 1], . . . b [ l,J ]], where graphics/364fig01.gif and b [ l,j ] {+1, -1} denotes the j th binary bit of the l th complex code symbol. By (6.177),

Equation 6.201

graphics/06equ201.gif


with

graphics/365equ01.gif

Due to the existence of the interleaver, we can assume that b [ l,j ] is independent of c [ l' ], l' l ; and b [ l,j ] is independent of b [ l,j' ], j j' . Based on the Gaussian model (6.198), we have

Equation 6.202

graphics/06equ202.gif


where C i W c and with a binary representation, C i [ B [ i , 1] · · · B [ i,J ]]. Then the a posteriori LLR of b [ l, j ] at the output of soft multiuser demodulator can be computed as

Equation 6.203

graphics/06equ203.gif


where graphics/365fig01.gif is the set of the complex code symbols whose j th binary bit equals +1; and graphics/365fig02.gif is defined similarly. The last equality in (6.203) follows from (6.201) and (6.202). The term l 2 ( b [ l, j ]) in (6.203) is the interleaved extrinsic LLR of the j th code bit for the l th complex code symbol in the previous iteration, and is computed by bitwise-subtracting the code-bit LLR at the input of the decoder from the corresponding code-bit LLR at the output (cf. Fig. 6.23). At the first iteration, no prior information about code bits is available; thus l 2 ( b [ l, j ]) = 0. It is seen from (6.203) that the output of the soft multiuser demodulator is the sum of the a priori information l 2 ( b [ l, j ]) provided by the MAP convolutional decoder in the previous iteration and the extrinsic information l 1 ( b [ l, j ]). Finally, the extrinsic LLRs of the code bits calculated in (6.203) are deinterleaved and then fed to the MAP convolutional decoder.

MAP Decoding Algorithm for Convolutional Code

Consider a rate- k / n binary convolutional code of overall constraint length k n . At each time t , the input to the encoder is the k -dimensional binary vector d t = ( graphics/366fig01.gif ) and the corresponding output is the n -dimensional binary vector b t = ( graphics/366fig02.gif ).

As shown in Fig. 6.23, the deinterleaved extrinsic LLRs of the code bits { l 1 ( b p [ i ])} i are fed as input to the MAP convolutional decoder. We partition this stream into n - sized blocks, each block consisting of n code bit LLRs, corresponding to the n output code bits at one time instant. Denote each block by a vector graphics/366fig03.gif , t = 1, 2, . . ., t , where t blocks of code bits are transmitted in each signal frame. The partitioned code-bit LLR stream is then denoted as graphics/366fig04.gif .

The extrinsic LLRs of the code bits { l 2 ( b p [ i ])} i are computed based on graphics/366fig04.gif and the convolutional code structure by the MAP decoding algorithm described in Section 6.2. Based on the interleaved extrinsic LLRs of the code bits in the previous iteration, l 2 ( b [ l, j ]), j = 1, 2, ... , J , the soft estimate graphics/363fig02.gif [ l ] cf. (6.189)] of the code symbol c [ l ] can then be computed as

Equation 6.204

graphics/06equ204.gif


where (6.204) follows from (6.175). At the first iteration, no prior information is available, and thus l 2 ( b [ l, j ]) = 0. At the last iteration, the information bits are recovered by the MAP decoding algorithm.

6.7.3 Projection-Based Turbo Multiuser Detection

In Section 6.7.2 we considered the problem of decoding the information of all users in the system. In some cases, however, we are interested in decoding the information of specific users only and are not willing to pay extra receiver complexity for decoding the information of undesired users. One approach to addressing this problem is to null out the signals of the K u undesired users at the front end and then to apply the iterative soft multiuser demodulation algorithm on the rest of K d = K K u users' signals [439]. In [476], a projection-based technique was proposed for interference cancellation in STC multiuser systems. Here, we discuss applying soft multiuser demodulation and iterative processing on the projected signal to further enhance the receiver performance.

Consider again the signal model (6.185). Divide the users into two groups, desired users and undesired users. Rewrite (6.185) as

Equation 6.205

graphics/06equ205.gif


where the subscript d denotes desired users and u denotes undesired users. Define graphics/367fig01.gif , graphics/367fig02.gif , and graphics/367fig03.gif (where graphics/367fig06.gif is the Moore “Penrose generalized inverse of H u [189]). It is assumed that the matrix H u is "tall" (i.e., MP > NK u ) and has full column rank. It is easily seen that

Equation 6.206

graphics/06equ206.gif


(i.e., the undesired users' signals are nulled out by this projection operation). Moreover, before projection, the number of linearly independent rows of H is MP , whereas after projection, the number of linearly independent rows of graphics/htilde.gif becomes MP NK u , which implies that in the projected system the effective number of receiver antennas (the effective receiver diversity order) is reduced to M' graphics/367fig07.gif ( MP NK u )/ P . Hence, the projection operation incurs a diversity loss. Following the same derivations as in Section 6.7.2, we can apply the soft multiuser demodulator and MAP decoder on the projected signal graphics/rtilde.gif in (6.206) to iteratively detect and decode the information bits of the desired users.

Since we assume that the fading channel remains static within an entire signal frame, which normally contains hundreds of code blocks (of N symbols), we need only compute the projection matrix graphics/367fig05.gif once per signal frame. Therefore, the dominant computation of the projection-based soft multiuser demodulator is the same as before. However, the overall computational complexity of the multiuser receiver is reduced, since now we need only decode K d users' information [i.e., only K d (instead of K ) MAP decoders are needed].

Simulation Examples

Next we provide computer simulation results to illustrate the performance of the turbo receivers in multiuser STBC systems. It is assumed that the fading processes are uncorrelated among all transmitter “receiver antenna pairs of all users; and for each user, the fading processes are uncorrelated from frame to frame but remain static within each frame. It is also assumed that the channel response matrix H in (6.185) is known perfectly . All users employ the same STBC code, but each user uses a different random interleaver. Furthermore, all users transmit M -PSK symbols with equal powers, a scenario in space-division multiple-access (SDMA) systems. Such an equal-power setup is also the worst-case scenario from the interference mitigation point of view.

We consider a four-user ( K = 4) STBC system, as shown in Fig. 6.22. Each user employs the STBC graphics/358fig02.gif defined in (6.184) and two transmitter antennas ( N = 2). An 8-PSK signal constellation is used in the modulator. The outer convolutional code, which is the same for all users, is a four-state, rate- ½ code with generator (5,7) in octal notation. The encoder is forced to the all-zero state at the end of every signal frame. Each signal frame contains 128 8-PSK symbols. At the receiver side, four antennas ( M = 4) are used.

Assume that all K users' signals are to be decoded ( K = 4). We first demonstrate the performance of the iterative receiver discussed in Section 6.7.2. The frame-error rate (FER) and the bit-error rate (BER) are shown in Fig. 6.24. For the purpose of comparison, we also include the performance of the single-user STBC system with iterative decoding. The dotted lines (denoted as SU1-1 ) in Fig. 6.24 represent the performance of the single-user system with two transmitter antennas ( N = 2) and four receiver antennas ( M = 4) after its first iteration [i.e., the conventional (noniterative) single-user performance]. The dash-dotted lines (denoted as SU1-6 ) in Figs. 6.24 and 6.25 represent the single-user performance after six iterations using the same iterative structure discussed in Section 6.7.2.

Figure 6.24. Frame-error rate (FER) and bit-error rate (BER) for a four-user STBC system. K = 4, N = 2, M = 4. All four users are iteratively detected and decoded. SU1-1 and SU1-6 denote the iterative decoding performance of the single-user system with K = 1, N = 2, M = 4.

graphics/06fig24.gif

Since a single user transmits different STC code symbols from its N transmitter antennas, it could be viewed as a virtual N -user system as discussed in Section 6.7.2. Then the iterative receiver structure for the multiuser STC systems can also be applied to single-user STC systems. Note that the optimal receiver of the proposed multiuser STBC system involves joint decoding of the multiuser STBC and outer convolutional codes, which has a prohibitive complexity graphics/325fig01.gif [ W c NK 2 n ]. However, the STBC signal model in (6.188), either single-user or multiuser, is analogous to the synchronous CDMA multiuser system model. As seen from previous sections, at high SNR, the iterative technique for interference suppression and decoding in a multiuser system can approach the performance of a single-user system (which is a lower bound for optimal performance). Hence it is reasonable to view the performance of the iterative single-user STBC system as an approximate lower bound on optimal joint decoding performance. It is seen from Fig. 6.24 that after six iterations the performance, in terms of both FER and BER, of both the single-user and multiuser STBC systems is significantly improved compared with that of the noniterative receivers (i.e., the performance after the first iteration). More impressively, the performance of the iterative receiver in a multiuser system approaches that of the iterative single-user receiver at high SNR.

We next demonstrate the performance of the projection-based turbo receiver. Assume that K d out of all K users' signals are to be decoded ( K = 4, K d = 2). In this scenario, two users are first nulled out by a projection operation, and the other two users are iteratively detected and decoded, as discussed in Section 6.7.3. The performance is shown in Fig. 6.25. It is shown in [476] that due to the projection operation, the equivalent receiver antenna number (the receiver diversity) is reduced from MP to MP “ N K u . So, for a fair comparison, in Fig. 6.25 we also present the iterative decoding performance after the first iteration (denoted by SU2-1 ) and after the sixth iteration (denoted by SU2-6 ) of the single-user system with two transmitter antennas ( N = 2) and two receiver antennas ( M' = 2), where M' denotes the effective number of receiver antennas for the projected system, with M' graphics/367fig07.gif ( MP NK u )/ P . It is seen that the projection-based turbo receiver still significantly outperforms the projection-based noniterative receiver. However, compared with the turbo receiver discussed above, the projection operation incurs a substantial performance loss. The reason for such a performance loss is twofold. First, the projection operation causes a diversity loss by suppressing the interference from other K u users; second, the projection operation enhances the background ambient noise. It is therefore preferable to use turbo receiver operating on all users' signals in STBC systems.

Figure 6.25. Frame-error rate (FER) and bit-error rate (BER) for a four-user STBC system. K = 4, N = 2, M = 4, M' = 2. Two users are first nulled out, the other two users are iteratively detected and decoded. SU2-1 and SU2-6 denote the iterative decoding performance of the single-user system with K = 1, N = 2, M' = 2. The gap between SU1-6 and SU2-6 constitutes the diversity loss caused by the projection operation.

graphics/06fig25.gif



Wireless Communication Systems
Wireless Communication Systems: Advanced Techniques for Signal Reception (paperback)
ISBN: 0137020805
EAN: 2147483647
Year: 2003
Pages: 91

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net