Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

S-38.

220 Licentiate Course on Signal Processing in Communications, FALL - 97

Channel Estimation Methods for CDMA

Petri Karttunen
Helsinki University of Technology Laboratory of Telecommunications Technology Address : Otakaari 5A, 02015 Espoo, FINLAND Tel. : +358-9-451 2425 Fax : +358-9-460 224

Email : Petri.Karttunen@hut.fi

Date: 23.10.1997

Contents

1 INTRODUCTION................................................................................................................................3

2 MODELING RADIO CHANNEL .....................................................................................................4 2.1 CDMA SIGNAL MODEL ..................................................................................................................4 2.2 FADING CHANNEL MODEL ..............................................................................................................7 3 CHANNEL ESTIMATION.................................................................................................................8 3.1 INTRODUCTION ...............................................................................................................................8 3.2 MAXIMUM LIKELIHOOD (ML).........................................................................................................9 3.2.1 General ML approach ..........................................................................................................10 3.2.2 ML in Channel Estimation....................................................................................................10 3.3 EXPECTATION MAXIMIZATION (EM).............................................................................................10 3.3.1 General EM approach..........................................................................................................10 3.3.2 EM in Channel estimation ....................................................................................................12 3.4 PARALLEL INTERFERENCE CANCELLATION (PIC)..........................................................................13 3.4.1 General PIC approach .........................................................................................................13 3.4.2 PIC in Channel Estimation...................................................................................................13 4 CONCLUSIONS ................................................................................................................................14

REFERENCES......................................................................................................................................15

1 Introduction
The wireless industry has grown enormously in recent years. The radio bandwidth resources are scarce and they are used inefficiently. As more personal services appear and the number of the mobile users increases the situation becomes worse. The consumers want more services with the increasing demands for better quality and for cheaper products. The great demand from the customers has compelled to making advances in the communication technology. Code Division Multiple Access (CDMA) system is the third generation mobile communication technique and it has been used especially in the military communication for over forty years in the USA [Dix94]. Now it appear in the telecommunication area as an applicable technique [Pic91]. The Telecommunication Industry Association (TIA) has presented the IS-95 cellular standard for CDMA that has further strengthened the position of CDMA. The commercial systems utilizes the power control to mitigate the near-far effect (see Figure 1) [Vit95]. Primarily, the purpose of the power control is to force the mobile phones to transmit at such a power level that the received signals from all the mobile handsets impinge on the antennas at the base station with almost equal power levels. This is done because the conventional detectors are sensitive to near-far effect and all the capacity benefits can not be obtained. Because the ideal power control cannot be applied, alternative receiver structures, like multistage interference cancellation receiver structures that make use of the knowledge of all the received users signals has to be utilized.

Figure 1 Illustration of fading signal and respective power control adjusted signal.

In the interference cancellation structures the good Multiple Access Interference (MAI) estimates for interference is needed. This demands that the complex channel coefficients should be estimated, i.e., the signal amplitude and phase. However, in the case of coherent detection the phase does not need to be estimated and the channel estimation problem reduces to that of estimating the amplitude. This paper surveys the ideas behind the channel estimation methods for CDMA system. For this purpose the paper is organized in the following way. In Chapter 2, the CDMA signal and the fading channel models are presented. Chapter 3 deals with the optimal joint detection and channel estimation and the suboptimal channel estimation methods. Finally, Chapter 4 concludes the results and discusses some future directions.
3

2 Modeling Radio Channel


2.1 CDMA Signal Model
In this section the general signal model for CDMA will be introduced which is utilized throughout the paper [Com78]. The antenna receiver is assumed to locate at the base station which is surrounded by N transmitting users. Each user transmits K symbols which impinge on the antenna. The receiver process the signal by taking couple of samples per chip in one chip period Tc. Symbol period denoted as T has been composed of Nc chips. The continuous signal waveform representation for receiver can be expressed as r (t ) =

k =1 n =1

bn ( k )n ( k ) sn (t kT n ) + n(t )

K N

(1)

where s(t) is the signature sequence, bn(k) is the transmitted symbol and n(k) is the channel coefficient each of which associated with the nth user. The transmitted bits are identically and independently distributed random variables with the values +1 and -1. Furthermore, the assumption for the channel parameters n and n if the antenna array is utilized at the base station is that they do not vary along the antenna array due to the propagation path delays. Also it is assumed that the propagation delay is in the range of -T<n<T. The noise term is n(t) is the Additive White Gaussian Noise (AWGN) with variance 2. The chip matched filtering gives the discretation of continuous signal. It can be shown that the matched filtering gives the sufficient statistics for parameter extraction and it can be expressed as r (i ) = 1 Tc

iT

( i +1) Tc
c

r (t )dt

(2)

which gives the statistics r(k) for kth symbol (k=1, , K) which is denoted without the noise term as r ( k ) = [r (0 + kN c ) r (1 + kN c ) ... r (( N c 1) + kN c )]
T

(3)

The crosscorrelation between signature sequences of two users n1 and n2 (n1,n2=1, , N) can be expressed as Rn1,n 2 ( k ) =

sn1 (t n1 ) sn2 (t + kT n2 )

(4)

In the synchronous system the delays n (n=1, , N) are the same and one user symbol interferes only one symbol of other users. In this case the crosscorrelation

matrix contains only diagonal elements. In the asynchronous case the symbols overlap with two symbols of other users. The received match filtered signal can be decomposed into y n ( k ) = bn ( k ) n ( k ) +
N K

k =0

bn ( k )n ( k )Rn,n ( k ) +

(5)

n '=1 k =1 n ' n

bn ( k )n' ( k ) Rn',n ( k ) + n( k ) sn ( n )

The first term consists of the desired signal term. The second term includes multipath interference whose strength is determined by the autocorrelation of the signature sequence of the user in interest. The third term includes Multiple Access Interference (MAI) from the different users whose effect is determined by the crosscorrelation between different users. The last term is the noise whose statistics deviates from the original noise n(t) due to correlation. Matrix representation Matrix notation is handy for presenting the different methods and their principles. The formulation shown here is based on the paper [Lat96]. The received signal can be expressed as r = SAb + n After the matched filtering the above equation can be expressed as y = RAb + n' In the matrix R the crosscorrelations are expressed as R (0) R=  R (0) where the subcorrelation matrix R (n) is expressed as R1,1 (n)  R1, N (n)   R ( n) =  R ( n)  R N ,1 N , N ( n ) (8) (7) (6)

(9)

The matrix S(N) consists of signature sequences of length Nc for each user n and the matrix S gives the signature sequences for every transmitted symbols.

S = diag S ( N ) ... ...S ( N ) K times

(10)

where the matrix S1 of size NcN consist of signature sequences for each user. The channel coefficients are defined as A ' = (a ( 0) .... a ( K 1) ) a ( k ) = diag 1 ( k ), ..., N ( k ) and the transmitted symbols are defined as b = b (1) ... b ( K ) b
(k )

A = diag( A ' )

(11)

= (b1 ( k ) ... b N ( k ))

T T

(12)
T

Final equation can be expressed as y = RAb + n y = Z() + n (13)

where the parameter vector is defined as =[a b ]. Eq (13) is the expression for one antenna element receiver. The difference between multi-sensor case is that the received signal has been phase shifted at different antenna elements according to the array manifold. However, in this paper it is assumed that only single sensor is utilized so that no special attention does not need to pay to the separate beamforming strategy. By utilizing multiple sensors we basically get more diversity. The Maximal Ratio Combining (MRC) rule can be used for performing soft decisions, i.e, combining the matched filter outputs in the optimal way [Kan95].

2.2 Fading Channel Model


Characterization of the channel is important when determining performance of different estimation methods. Narrowband channel is assumed so that the delay spread of the channel is smaller than half of the symbol period. The narrowband modeling plays the role when different paths impinge on the antenna array approximately at the same time and can not be resolved in the receiver. The received faded signal can be expressed as re j =

rp e
p =1

j p

(14)

where P is the number of the paths, rp is the path amplitude and p is the phase of the signal [Pah95]. Depending on the relative phase values the signal components may add together either constructively or destructively causing strong signal to appear or

deep fades. This phenomena cause the received signal to fluctuate in time depending on the rapidity of Doppler shift. Rayleigh fading implies that the envelope of the signal is produced by the summing of many signal components with the same amplitudes and uniformly distributed phase values. Physically this situation is caused by the uniform scattering near the mobile phone whose scattering radius is smaller than the distance from the base station. Figure 2 shows the autocorrelation functions for Rayleigh fading process with different Doppler shifts. From the plot it can be seen that with the mobile speed of 110 km/h the amplitudes do not correlate with each other very much after 3 symbol periods. This means that the channel coefficients lose their validity during this time and new coefficients have to be estimated.
Sampling time=0.977ms. 1

f =110 km/h m fm=50 km/h fm=10 km/h

0.5
Amplitude correlation

0.5

0.005

0.01

0.015

0.02

0.025 Time [s]

0.03

0.035

0.04

0.045

0.05

Figure 2 Fast fading amplitude correlation. Sampling time T1.0ms.

The fading channel model can be generated according to the computerized model for example as described in [Pt96]. These Narrowband channel generation methods are generally based on the classical Jakess model or filtered Gaussian noise -concept. [Loo91][Pt96]. From the Wide Sense Stationary Uncorrelated Scattering (WSSUS) channel viewpoint the fast fading means that the channel is time-variant during the symbol period and thus do not change very much during few symbol periods. The slowly fading channel implies that the channel is time-invariant also during the symbol period and new channel coefficients must be acquired for each symbol.

3 Channel estimation
3.1 Introduction
In this section, an intuitive method for the channel estimation is presented with the assumption that other parameters are known. It is assumed that the coherent detection is used which results the complex channel coefficient estimation to pure amplitude estimation. The output of the bank of the matched filter can be expressed as Eq (5). From that it can be deduced that there is three procedures to be carried out in order to get the channel coefficients. As a first step, the MAI estimates are formed and subtracted from the matched filter outputs (see from the general structure at Figure 3). If the MAI estimate can be modeled as white Gaussian noise the single user detector is the optimal. The delays, channel coefficients and data bits of other interfering users must be known or estimated in order to get that MAI term. If the interference from the other sources is negligible due to low crosscorrelation this can be avoided but otherwise MAI term should be subtracted from the output of the matched filter. In general, the code orthogonality cannot be guaranteed in the asynchronous channel and the MAI term is not insignificant. The second step is the removing of data modulation by multiplying with the complex conjugate of data symbol. If these data estimates are erroneous this data removal operation deteriorates the channel estimates. The method works only if SNR is high and good tentative decisions can be made. Therefore, preamble known symbols are transmitted in order to initialize the receiver. This is known as the data-aided channel estimation. Because the channel estimate includes added noise the filtering is obviously needed for suppressing the noise. The channel coefficient estimates are smoothed by using FIR filter as n ( k ) = ~ an w (15)

where ~ a n includes the past channel estimates and w is the vector of the filter coefficients. Eq. (15) is the Wiener-Hopf equation and the iterative methods like Least Mean Square (LMS) and Conjugate Gradient (CG) methods can be applied. However, this filtering operation causes the delay for the channel estimation which deteriorates the channel estimates.

~ (k ) a n

Filter

 an ( k )
*

MF

rn ( k )

yn ( k )

 bn ( k )

n (k )

 bn ( k )

Figure 3 Channel estimator for single user case.

The above structure is not suitable if the final symbol estimates are not known, for example no pilot symbols are sent. The solution for this could be the joint channel estimation and detection but this results in complex structures. The way around this is to approximate certain parameters by keeping them fixed as estimating some other parameters.

3.2 Maximum Likelihood (ML)


3.2.1 General ML approach Optimum method for the joint data detection and channel estimation is the ML approach. Figure 4 shows the general structure for estimating the bits bn(k) (n=1, , N and k=1, , K) of each users. ML optimization problem can be expressed as
H 1 P( y; ) = C * exp 2 (y RAb) (y RAb)

(16)

where the is the parameter vector. In the general case ML method needs the complex multidimensional search over parameter space and thus the method is useless for the practical systems. For the asynchronous channel the complexity of this kind of estimator depends exponentially on both the number of users N and transmitted symbols K because only one transmitted symbol and optimization approach cannot be used anymore.
M a t c h e d f i l t e r s

E s t i m a t i o n

D e t e c t i o n

b1

bn

bN

= [a , ]

Figure 4 General optimum receiver structure for estimating the data bits.

The complexity demands can be reduced by using dynamic forward/backward programming methods like Viterbi algorithm [The92]. The computation of the general criterion function results in too heavy calculations. Therefore the iterative methods could be also utilized. The search procedures could be based on the steepest descent, the Newton-Raphson procedure or the Gauss method [Sor80]. The steepest descent has the simplest form and the Newton method is the most complicated one because it requires the computation of the second derivative. The update rule based on the Newtons solution for the minimization problem can be expressed at the ith iteration step as
i i k = k + H 1G

(17)

where G and H are the first and second derivatives of the criterion function with the respect to the desired parameter respectively and is a suitable chosen step size. Other way around is to apply the multistage receiver structures where the estimates are also updated sequentially. 3.2.2 ML for channel estimation The realizable receiver structures can be achieved by assuming that some of the parameters are known in advance or are approximated. In this section it is assumed that the tentative data decision have been got for example from training sequence and delays are known for channel estimation. The probability density function for sufficient statistics y can be expressed as
H 1 P( y; A ) = C * exp 2 (y RAb) (y RAb) 1 = C * exp 2 2 Re ( Ab) H y ( Ab) H R ( Ab)

(18)

In this equation it is assumed that the other parameters are known in advance. As a consequence, ML estimate of the parameter vector A with the respect to which the minimization problem should be carried out given the observations can be expressed as  = arg max{log P( y; A )} A
A

(19)

Above Eq. (19) can be solved by taking gradient with respect to a giving A P( y, A ) = 2b H y + 2( Ab) H Rb = 0 And solving this we get  = bR 1 y A (21) (20)

10

3.3 Expectation Maximization (EM)


3.3.1 General EM approach The direct maximization of the general maximum likelihood expression leads into the nonlinear multidimensional search over the parameter space. Other way around the computational complexity problems is to apply EM method. The aim behind the method is the division of superimposed signal components to independent parts [Fed88]. Let us suppose that the nth signal component of rn(t) after some imaginary decomposition can be expressed as rn (t ) = z n (t ) + nn (t ) z n (t ) = bn ( k ) n ( k ) sn (t kT n ) r (t ) =
n =1

(22)

rn (t )

Now, all the signal components rn(t) and zn(t) (n=1, , N) are collected to vectors r(t) and z(t) respectively. They can be expressed as r1 (t ) r (t ) = ... and z(t ) = r N (t ) z1 (t ) ... z N (t )

(23)

The data vector z(t) is called complete because it contains all the necessary data. The incomplete data vector r(t) is observable but has the hidden data. The mapping between complete data vector z(t) and incomplete data vector r(t) in the matrix notation can be expressed as r (t ) = Mz(t , ) (24)

where the mapping matrix M and the parameter vector is introduced. The mapping matrix is constrained the assumption that summing of all the noise components result in the original noise term n(t). The arbitrary weighting scalars n sums to the unity. By using the linear transformation of variables between r(t) and z(t) we can obtain the general expression for the conditional density function of complete data z(t) given r(t) with the parameter vector [Fed88]. This forms the E-step of the EM method. E z(t )| r (t );  = z(t , ) + R N M H MR N M H

)1[r(t ) Mz(t ,)]

(25)

The conditional expectation of log-likelihood expression of complete data z(t) can be expressed as Eq (26) which is to be maximized with respect to the parameter vector . This forms the M-step of EM method and it can be shown that it is usual ML estimation problem but it requires search in much lower dimension space.

11

min E[ z(t )| r(t ); ] z(t ,

1 Rn E[ z(t )| r(t ); ] z(t , )

]
n

(26)

EM iteration method for the parameter component of interest can be defined now. By  utilizing the conditional expectation z iter (t ) = E z (t )| r (t );  iter we get the
n

following update rule for n signal estimate: Iterate until no more convergence is achieved and for each n (n=1, , N) perform the following two steps: E-step:
N ni (t ) = z n (t , ni ) + n r (t ) z n ' (t , ni ) r n '=1

th

(27)

M-step:

ni +1 = arg min


n

i * i n ( t ) z n ( t , n )) ( r n ( t ) z n ( t , n )) 1 (r dt 2 T n

(28)

z1(t) r(t) Signal Decomposition zN(t) MLN ML1


: :

1i(t)
: :

Ni(t)

: :

Convergence achieved

Figure 5 Principle of EM algorithm

3.3.2 EM for Channel Estimation The channel coefficients can be calculated by keeping other parameters constant. The channel coefficients can be expressed as
 ( k ) z ( t )s ( t kT ) dt n ( k ) = arg min b n n n n

(29)

 (k ) = n

1  b ( k ) z (t )sn (t kT n )dt T n n n

In order to estimate the channel coefficients the initial data estimates are needed. This problem can be overcome by transmitting known preamble symbols. In the same way the rough delay estimates can be acquired. The initial estimates for the channel coefficient can be chosen as zeros. By using multiple stages tentative symbols estimates can be obtained from the first receiver stage which can be utilized for the

12

channel estimation purposes in the later stage. The channel estimates are not very accurate after some symbol periods due to fading so they can not be used anymore for the channel estimation purposes. When the channel estimates are finally obtained they should be filtered in order suppress the noise. Iterative EM algorithm for the channel estimation can be derived by taking the gradients of the conditional log-likelihood function with respect to the channel coefficient. It is assumed that the other parameters are known. Therefore, EM estimator for amplitude can be expressed as
N ( i +1) (i ) (i )  * ( k ) (k ) = n ( k ) + n b ( ) ( k )Rn ,n ' ( k ) y k bn ( k ) n n n n n '= 0

(30)

It can be seen that that in EM approach the reconstructed matched filter output for desired user is subtracted from the matched filter outputs. In the fading channel the channel coefficients are not constant and they must be continuously predicted and noise smoothed.

3.4 Parallel Interference Cancellation (PIC)


3.4.1 General PIC approach The multistage detection methods are attractive as they iteratively improves the bit estimates. The iterative scheme can be obtained by maximizing the log likelihood function under the symbol synchronous assumption with respect to the kth bit estimate of current user with the condition that as bit estimates of other users have been used the bit estimates of the previous stages, i.e., the bit estimates from the previous iterations [Var91]. The minimization problem can be expressed as  (i ) ( k ) = arg b n
bn ( k ){1, 1} ( i 1) bn ' ( k ') =bn ' ( k ') ( n , k ) ( n ', k ')

max

Re (Ab) y (Ab) R (Ab)


H H

(31)

By performing this minimization problem it can be shown that the ith stage bit estimate of the kth symbol can be expressed as  (i ) ( k ) = sign Re * z (i ) ( k ) b n n n

{ [

]}

(32)

The term zn(k) is the sufficient statistics which is expressed as


(i ) (k ) = yn (k ) zn

n '=1 n ' n

 (i 1) ( k ) ( k ) R b ( n ,n ') ( k ) n n

(33)

This kind of the structure has been called as Parallel Interference Cancellation (PIC) scheme because all the interference components has been canceled simultaneously from the matched filter output of desired signal. The bit estimate of the initial stage

13

should be selected accurately enough but too complex structure is not desirable. Both the conventional and decorrelating detectors have been proposed and used successfully [Lat96]. Because Eq (18) is the convex function the maximum occurs when
1 1  b ML = arg max P ( y; ) = Re A R y b

(34)

This is also known as the decorrelator detector. 3.4.2 PIC in Channel Estimation It can be seen from the above equation that the channel estimates can be obtained by subtracting MAI terms from the matched filter output of user in interest. After subtraction the effect of the data modulation is removed and the estimated channel coefficient can be expressed as N * (k ) y (k ) b  ( k ) n ( k ) = b n ( k )Rn ,n ' ( k ) n n n n '= 0 n ' n

(35)

The recursive channel estimator can be developed from the above equation for time varying channel. The rough channel estimates should be filtered in order to remove noise [Lat96].

4 Conclusions
This paper concentrated on two channel estimation approach for CDMA. Optimal ML formulation was presented and was noticed to have too heavy computational complexity. First suboptimal structures under inspection was the EM method. The estimator it gave was noticed to be intuitively right. The other formulation starting from ML solution lead into the PIC estimator. It basically resulted in the same structure but the philosophy from what it was derived was totally different.

14

References
[Com78] [Dix94] [Fed88] [Has79] [Has93] [Kan95] [Lat96] [Loo91] [Pah95] [Pic91] [Pt96] R. T. Compton, An adaptive array in a spread spectrum communication system, Proceedings of the IEEE, Vol. 66, No 3, pp. 289-298, Mar. 1978. R. C. Dixon, Spread Spectrum Systems with Commercial Applications, John Wiley & Sons, 1994. M. Feder and E. Weinsten, Parameter Estimation of Superimposed Signals Using the EM algorithm, IEEE Trans. On Acoustic, Speech and Signal Processing, Vol. 36, No. 4, April, 1998, pp. 477-489. H. Hasnemi, Simulation of the Urban Radio Propagation Channel, IEEE Trans. On Vehicular Technology, Vol. VT-28, No. 3, Aug, 1979, pp. 213225. H. Hasnemi, The Indoor Radio Propagation Channel, Proceedings of the IEEE, Vol. 81, No. 7, July, 1993, pp. 943-968. S. Kandala, E. S. Sousa and S. Pasupathy, Multi-User Multi-Sensor Detectors for CDMA Networks, IEEE Trans. On Communications, Vol. 43, No. 2/3/4, Feb/March/April, 1995, pp. 946-957. M. Latva-aho, Channel Estimation in Multiuser CDMA Receivers, Raportti No. 131, Oulu. C. Loo and N. Secord, Computer Models for Fading Channels with Applications to Digital Transmission, IEEE Trans. On Vehicular Technology, Vol. 40, No. 4, Nov, 1991, pp. 700-707. K. Pahlavan and A. H. Levesque, Wireless information network, John Wiley & Sons, 1995. R. L. Pickholtz, L. B. Milstein and D. L. Schilling, Spread spectrum for mobile communications, IEEE Trans. on vehicular technology, Vol. 40, No. 2, pp. 313-321, Aug. 1993. M. Ptzold and U. Killat, A Deterministic Digital Simulation Model for Suzuki Processes with Application to a Shadowed Rayleigh Land Mobile Radio Channel, IEEE Trans. On Vehicular Technology, Vol. 45, No. 2, May, 1996, pp. 318-330. H. W. Sorenson, Parameter Estimation Principles and Problems, Marcel Dekker, New York, 1980. C. W. Therrien, Discrete Random signals and Statistical Signal Processing, Englewood Cliffs: Prentice Hall, 1992. M. K. Varanasi and B Aazhang, Near-Optimum Detection in Synchronous Code-Division Multiple-Access Systems, IEEE Trans. On Communication, Vol. 39, No. 5, May, 1991, pp. 725-736. A. J. Viterbi, CDMA Principles of spread spectrum communication, Addison-Wesley publishing company, 1995. Z. Zvonar and D. Brady, Multiuser Detection in Single-Path Fading Channels, IEEE Trans. On Communication, Vol. 42, No. 2/3/4, 1994, pp. 1729-1739. Z. Zvonar and D. Brady, Suboptimal Multiuser Detector for FrequencySelective Rayleigh Fading Synchronous CDMA Channels, IEEE Trans. On Communication, Vol. 43, No. 2/3/4, 1995, pp. 154-157.

[Sor80] [The92] [Var91]

[Vit95] [Zvo95] [Zvo95]

15

You might also like