Dirty RF
Dirty RF
Dirty RF
Reviewers:
Date of submission:
04/10/2013
Date of defence:
URN:
27/06/2014
urn:nbn:de:gbv:ilm1-2014000134
Acknowledgements
The help of various people have made this thesis possible or complete. First, I would like to
thank my supervisor Prof. Reiner Thom for the continuous support, encouragement, and his
human way throughout the last years. Without him, I would not have chosen this topic and
this thesis would not exist. Second, I would like to thank my master students Diego Dupleich
and Florian Schlembach for their valuable and fruitful cooperation and their contribution
to this thesis through their master theses and student assistant jobs. Third, I thank all
colleagues of the department Electronic Measurement Research Lab for discussions on
all matters and for the friendly working atmosphere. I would like to mention especially
my office colleagues Gerd Sommerkorn, Peter Rauschenbach, Robert Mller, and Stephan
Hfner for their friendly way and support in the everyday work. Throughout the doctoral
studies, feedback is indispensable to successfully complete a PhD. I would like to thank Prof.
Matthias Hein, Wim Kotterman, Ralf Herrmann, and Rajesh Sharma for proof-reading
my papers and thesis. I thank Kurt Blau for fruitful discussions, especially during lab
experiments.
The work presented in this thesis has been carried out within the International Graduate
School on Mobile Communications, that is supported by the German Research Foundation
(DFG GRK1487). I would like to thank Prof. Andreas Mitschele-Thiel for giving me the
chance to work on an interesting research project, and Mirko Kirschkowski for his kind
administrative support throughout my doctoral studies.
The cooperation with external partners has made this thesis complete. I feel special gratitude
for Prof. Mikko Valkama for reviewing my thesis and giving me the opportunity to visit
Tampere University of Technology in Finland for three months. This stay abroad enriched
my social and technical skills significantly. My special thanks go to Markus Alln and Jaakko
Marttila for the greatest cooperation one can think of, even in the time after my visit, where
we prepared a joint journal article for IEEE Trans. on Microwave Theory and Techniques
[GAM+14]. Furthermore, I would like to thank Reda Zemmari from Fraunhofer FKIE for
the great cooperation in the field of GSM and passive radar. Besides, I am very grateful for
our guest researcher Andrey Budilov for his cooperation and for being a great host during a
vacation in Russia in 2011.
iii
During my doctoral studies, I found many new friends who are colleagues in the Graduate
School. I would like to thank Alexander Krah, Andr Puschmann, Noman Murtaza, Anastasia Lavrenko, Tobias Simon, Christopher Schirmer, and Jonas Knig for their cooperation
at work and the nice time at workshops, conferences, and any social event beside work. You
made the last years to an unforgettable time in my life.
Finally, I would like to thank my parents, my brother and sister-in-law, and my grandparents
for their everlasting support and encouragement on my way. Furthermore, I have to thank
my girlfriend Katharina for her love, trust and motivation throughout the last years since
my diploma time.
Michael Grimm
iv
Zusammenfassung
Moderne drahtlose Kommunikationssysteme stellen hohe und teilweise gegenstzliche Anforderungen an die Hardware der Funkmodule, wie z.B. niedriger Energieverbrauch, groe
Bandbreite und hohe Linearitt. Die Gewhrleistung einer ausreichenden Linearitt ist,
neben anderen analogen Parametern, eine Herausforderung im praktischen Design der
Funkmodule. Der Fokus der Dissertation liegt auf breitbandigen HF-Frontends fr Softwarekonfigurierbare Funkmodule, die seit einigen Jahren kommerziell verfgbar sind. Die praktischen Herausforderungen und Grenzen solcher flexiblen Funkmodule offenbaren sich vor
allem im realen Experiment. Eines der Hauptprobleme ist die Sicherstellung einer ausreichenden analogen Performanz ber einen weiten Frequenzbereich. Aus einer Vielzahl an
analogen Streffekten behandelt die Arbeit die Analyse und Minderung von Nichtlinearitten
in Empfngern mit direkt-umsetzender Architektur. Im Vordergrund stehen dabei Signalverarbeitungsstrategien zur Minderung nichtlinear verursachter Interferenz ein Algorithmus,
der besser unter Dirty RF-Techniken bekannt ist. Ein digitales Verfahren nach der Vorwrtskopplung wird durch intensive Simulationen, Messungen und Implementierung in realer
Hardware verifiziert. Um die Lcken zwischen Theorie und praktischer Anwendbarkeit zu
schlieen und das Verfahren in reale Funkmodule zu integrieren, werden verschiedene Untersuchungen durchgefhrt. Hierzu wird ein erweitertes Verhaltensmodell entwickelt, das
die Struktur direkt-umsetzender Empfnger am besten nachbildet und damit alle Verzerrungen im HF- und Basisband erfasst. Darber hinaus wird die Leistungsfhigkeit des Algorithmus unter realen Funkkanal-Bedingungen untersucht. Zustzlich folgt die Vorstellung
einer ressourceneffizienten Echtzeit-Implementierung des Verfahrens auf einem FPGA. Abschlieend diskutiert die Arbeit verschiedene Anwendungsfelder, darunter spektrales Sensing,
robuster GSM-Empfang und GSM-basiertes Passivradar. Es wird gezeigt, dass nichtlineare
Verzerrungen erfolgreich in der digitalen Domne gemindert werden knnen, wodurch die
Bitfehlerrate gestrter modulierter Signale sinkt und der Anteil nichtlinear verursachter Interferenz minimiert wird. Schlielich kann durch das Verfahren die effektive Linearitt des
HF-Frontends stark erhht werden. Damit wird der zuverlssige Betrieb eines einfachen
Funkmoduls unter dem Einfluss der Empfngernichtlinearitt mglich. Aufgrund des flexiblen Designs ist der Algorithmus fr breitbandige Empfnger universal einsetzbar und ist
nicht auf Software-konfigurierbare Funkmodule beschrnkt.
Abstract
Todays wireless communication systems place high requirements on the radios hardware
that are largely mutually exclusive, such as low power consumption, wide bandwidth, and
high linearity. Achieving a sufficient linearity, among other analogue characteristics, is a
challenging issue in practical transceiver design. The focus of this thesis is on wideband
receiver RF front-ends for software defined radio technology, which became commercially
available in the recent years. Practical challenges and limitations are being revealed in realworld experiments with these radios. One of the main problems is to ensure a sufficient
RF performance of the front-end over a wide bandwidth. The thesis covers the analysis
and mitigation of receiver non-linearity of typical direct-conversion receiver architectures,
among other RF impairments. The main focus is on DSP-based algorithms for mitigating
non-linearly induced interference, an approach also known as Dirty RF signal processing
techniques. The conceived digital feedforward mitigation algorithm is verified through extensive simulations, RF measurements, and implementation in real hardware. Various studies
are carried out that bridge the gap between theory and practical applicability of this approach, especially with the aim of integrating that technique into real devices. To this end,
an advanced baseband behavioural model is developed that matches to direct-conversion
receiver architectures as close as possible, and thus considers all generated distortions at RF
and baseband. In addition, the algorithms performance is verified under challenging fading
conditions. Moreover, the thesis presents a resource-efficient real-time implementation of the
proposed solution on an FPGA. Finally, different use cases are covered in the thesis that
includes spectrum monitoring or sensing, GSM downlink reception, and GSM-based passive
radar. It is shown that non-linear distortions can be successfully mitigated at system level
in the digital domain, thereby decreasing the bit error rate of distorted modulated signals
and reducing the amount of non-linearly induced interference. Finally, the effective linearity
of the front-end is increased substantially. Thus, the proper operation of a low-cost radio
under presence of receiver non-linearity is possible. Due to the flexible design, the algorithm is generally applicable for wideband receivers and is not restricted to software defined
radios.
vii
Contents
1 Introduction
3
4
2 Non-linear Distortions
7
7
2.1.2
2.1.3
8
9
2.1.4
10
11
15
2.3.1
2.3.2
Effects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
19
22
23
2.5.1
2.5.2
23
25
2.5.3
2.5.4
Modelling of RF Non-linearity . . . . . . . . . . . . . . . . . . . . . .
Modelling of BB Non-linearity . . . . . . . . . . . . . . . . . . . . . .
28
33
2.5.5
37
2.5.6
2.5.7
40
43
48
51
2.7.1
2.7.2
51
53
2.7.3
57
ix
Contents
2.8 Summary about Receiver Non-linearity . . . . . . . . . . . . . . . . . . . . .
3 Mitigation Techniques
64
65
3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
65
3.1.1
Transmitter Non-linearity . . . . . . . . . . . . . . . . . . . . . . . .
65
3.1.2
Receiver Non-linearity . . . . . . . . . . . . . . . . . . . . . . . . . .
69
72
76
76
3.4.1
Analogue Cancellation . . . . . . . . . . . . . . . . . . . . . . . . . .
77
3.4.2
80
81
83
4.1 Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
83
4.2 Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
86
4.2.1
Bandsplit Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . .
86
4.2.2
88
4.2.3
Adaptive Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
95
4.4.2
RF Measurements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
125
5.2.2
5.2.3
139
Contents
6.3 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
6.4 Summary of Real-time Implementation Issues . . . . . . . . . . . . . . . . . 151
7 Application Scenarios
153
7.1.2
7.1.3
7.1.4
7.2.2
7.2.3
177
181
List of Symbols
187
List of Figures
192
List of Tables
193
List of Publications
195
Bibliography
197
A Mathematical Derivations
211
213
xi
Contents
C Source Code
219
223
xii
1 Introduction
The demand for broadband wireless communications is increasing every year and continuously accelerates the pace of engineering and science. There is an exponential growth in
data traffic due to the increasing number of users subscribing broadband packages and the
emergence of new devices, data services, and applications. A current trend is to apply multimode and multi-band transceivers based upon simple radio frequency (RF) front-ends that
integrate a variety of wireless standards. Conventional communication systems have fixed
radio parameters such as carrier frequency, bandwidth, and modulation scheme. Instead,
software defined radio (SDR) technology is experiencing increasing popularity where most
of the signal processing is performed in the digital domain. Thereby, simple and flexible
RF hardware can be realised and applied in many different use cases, operating at different
frequencies, power levels, and with different waveforms. Suitable areas of application for
this technology lie not only at the mobile terminal side, where costs have to be kept low
for mass production, but also the base station side that have to accommodate for various
wireless systems in a large frequency range. For instance, cognitive radio (CR) has been
proposed as a novel concept to solve the spectrum scarcity problem by utilising flexible SDR
hardware. Most of the CR research deals with theoretical analyses or is based on simulations that often do not consider the physical limitations of the radio. Since SDR platforms
became commercially available, the community is now focusing on real implementations and
practical evaluation of proposed algorithms and concepts. Thereby, practical limitations of
transceiver electronics in RF front-ends for SDR turned out to cause a performance degradation of the radio. Moreover, future emerging wireless communication systems demand
for higher bandwidth, higher-order constellation diagrams, and multiple antennas. These
increases in modem performance, bandwidth, and carrier frequency provoke dirt effects that
have reached a new problem level. In brief, systems will definitely become more sensitive to
front-end non-idealities. Therefore, it is worthwhile to analyse these effects and to look for
solution strategies.
1 Introduction
1 Introduction
linearity and dynamic range requirements of the front-end, enabling the design of low-cost
receivers. That requires a close cooperation between RF and signal processing engineers.
2 Non-linear Distortions
This chapter deals with typical front-end architectures adopted in state-of-the-art receivers
as well as with sources of non-linearity. In addition, BB models of non-linear front-ends
are developed that are used later in the mitigation part. To end the chapter, results of an
experimental characterisation of a typical SDR platform with narrowband and wideband
test signals are presented.
2 Non-linear Distortions
LP
VGA
ANT
0
90
BP1
LNA
ADC
ADC
LO2
BP2
LO1
LP
VGA
VGA
ANT
0
90
BP
ADC
ADC
LO
LNA
LP
VGA
LP
ADC
ANT
digital domain
VGA
BP
sin
LO
cos
Q
0
90
LNA
ADC
Q
LP
NCO
VGA
2 Non-linear Distortions
preferences as in the zero-IF architecture, a large image rejection ratio (IRR) is required for
this receiver topology.
There are various other receiver types that are out of scope here, such as bandpass sampling
or direct RF sampling, that apply discrete-time analogue signal processing by subsampling
[GCB08]. These concepts can save the mixer through a subsampling operation, but impose
very tough bandpass filter specifications in order to avoid aliasing. Hence, these architectures
are not suited for flexible SDR front-ends that are on focus in this thesis.
Analogue Domain
ANT
LNA
ADC
Baseband
Processing
10
11
2 Non-linear Distortions
if there is no proportional relationship between the input and output. Figure 2.5 depicts
examples of different transfer functions, a linear and two non-linear curves derived from
different input-referred third-order intercept points (IIP3s), a measure for the strength of
non-linearity. The lower the value of IIP3, the stronger is the non-linearity. A linear device
0
Linear
IIP3 = 15 dBm
IIP3 = 12 dBm
1
2
1
0.5
0
Input voltage (V)
0.5
12
y(t)
Digital Back-end
ADC
IF-A
LNA
y(n)
DSP
(FPGA)
USRP N210
SW
PC
LO
Figure 2.6: Block scheme of a typical SDR receiver, taking the example of USRP N210+WBX
[Ett].
distort electrical signals, but can be sometimes useful for certain applications, such as for
designing a mixer by using generated harmonics of the LO.
Now, sources of distortions in a typical RF front-end for SDR are discussed, taking the
example of Universal Software Radio Peripheral (USRP) version N210 with a wideband RF
front-end (WBX) [Ett]. Details on this receiver, that is used for many of the RF measurements in this thesis, are given in Appendix B. Figure 2.6 depicts a block scheme, where all
components with non-linear characteristics are highlighted. The WBX front-end is built as
a low-IF architecture without SAW pre-selection filter, converting the RF signal down to a
low user definable IF (see also Appendix B). Non-linear components in this front-end are
the LNA and the IF amplifier, the mixer and the LO, as well as the ADC.
The LNA provides substantial gain of the RF signal and fixes the noise floor [HB08]. As a
classical amplifier, it suffers from gain compression under large-signal excitation and causes
non-linear distortions.
The mixer translates the RF signal to BB with a non-linear conversion characteristic. A
single frequency generated by the LO is required for the mixing process. However, a non-ideal
LO may also create harmonics beside the fundamental frequency that can mix with potential
interferers, if the receiver bandwidth is wide enough [Raz97; Raz09]. This effect is negligible
for higher harmonics as their magnitude is inversely proportional to the frequency.
The BB or IF amplifier is used for optimal analogue/digital (A/D) conversion and behaves
in a same non-linear manner as the LNA. However, in terms of linearity performance, the
BB amplifier is typically worse than the RF amplifier (LNA).
The ADC is responsible for digitisation of the analogue BB signal, however, suffers
from non-linearity and other impairments, such as quantisation noise, sampling clock off-
13
2 Non-linear Distortions
1
3
ADC
ANT
2
LNA
LO
IF-A
duplexer
DAC
PA
LO
IF-A
14
2.3.1 Effects
General results of circuit non-linearity are twofold. First, new frequency components are
generated by the non-linear device, thereby adding unwanted signal energy to the received
signal [Ken00]. Second, there is an amplitude-dependency of the fundamental signal gain
[VR03]. Phenomena of non-linear systems can be classified in order and degree [VR03].
The higher the order of non-linearity, the more non-linear signal content will be generated.
Degree is a property of the non-linear device and defines the shape of the non-linearity.
Order is related to the amplitude and frequency of the distortion terms, that depend on the
degree of non-linear device and the amplitude and frequency of the input. For instance, the
order of a distorted signal can be higher than the degree of the device in case the input was
already distorted, e.g. in cascaded non-linear devices in a DCR chain (see Section 2.5.5).
Typically, non-linear devices are classified into linear, mildly non-linear, and strongly nonlinear according to their degree of non-linearity (see also Figure 2.5) [Sch09].
15
7
4
5
6
even-order
odd-order
HD
IMD
7th
6th
4th
3rd
2nd
DC
Fund
2nd
4th
5th
6th
f /fc
2 Non-linear Distortions
Figure 2.8: Spectral components induced by non-linear device with degree 7 and two-tone
input.
16
Compression or in-band distortion denotes the impact of the receiver non-linearity on the
original input signal that basically results in gain reduction as illustrated in Figure 2.5.
Harmonic distortion (HD) denotes integer multiples of the input frequency fc . That is,
harmonic signals are generated at DC, 2fc , 3fc , up to N fc , where the factor N is the order.
HDs are already generated with a single input tone, which is especially a crucial effect for
non-linear LOs. In Figure 2.8, HDs are depicted with dashed lines and squared markers.
Intermodulation distortion (IMD) or non-harmonic distortion describe linear combinations of the input frequency components. They can be interpreted as the response of the
non-linear system to multiple signals at the input that comprises at least two frequencies
[Rou09]. Odd-order IMD are the most annoying effects and describe distortion terms falling
into the desired frequency band nearby the original input. Multiple odd-order IMD terms
cause a spreading of the original input signal, also called spectral regrowth or out-of-band
distortion, especially in the field of transmitter non-linearity. It is a special term for IMD
caused by complex-envelope or non-constant envelope modulated signals and is referred to
the bandwidth of the input signal [Sch09]. Even-order IMD shows up around DC and plays
a key role in DCRs, where even-order distortion induced by the LNA easily leak through BB
via the mixer (see Section 2.2), or directly fall on top of the desired signal if the receiver has
a high bandwidth over several decades. The IMD products show up in each harmonic zone,
illustrated with straight lines and circled markers in Figure 2.8, surrounding the harmonic
frequencies of the pure tones. For an input of two tones at f1 and f2 , the new frequencies
generated due to HD and IMD will be of the form
f = m f1 n f2 ,
17
(2.1)
2 Non-linear Distortions
where m and n are positive integers and m + n equals the order of distortion [Ken00]. If
either m or n is zero, the resulting frequency denotes HD, otherwise IMD. Following the
example of a non-linear device with degree 7, as illustrated in Figure 2.8, m and n will run
from 0 to 7 in (2.1), while obeying the condition m + n 7.
Weak wanted
signal
XMD
Non-linear system
Figure 2.9: Impact of cross-modulation distortion (XMD) onto a weak carrier.
18
Memory effects cannot directly be measured from the input and/or output signal of the
non-linear circuit [ZWC10]. Memory itself does not modify the steady-state signal waveform,
but introduces a phase shift between the input and the output. Thereby, the largest time
delay of the output determines the depth or order of the memory. Indicators for memory
effects in practical measurements are, e.g. imbalances between the upper and lower IMD
products in case of multi-tone excitation, or spread of AM/AM and AM/PM [Sch09]. In the
latter case, the conversion is broadened, i.e. the input/output values are not identical to the
mean amplification. In general, memory effects appear if the bandwidth of the excitation
signal is comparable with the inherent bandwidth of the analogue receiver components.
To sum up, non-linearities limit the receiver sensitivity and dynamic range through aforementioned distortion phenomena.
2.3.2 Metrics
There are several practical metrics describing the non-linear behaviour that differentiate
between narrowband and wideband modulated signals [VR03; Ken00]. Figure 2.10 is illustrating, in logarithmic scale, the output vs. the input power of a non-linear device of third
degree and supports the derivation of typical metrics for circuit non-linearity.
1dB compression point (P1dB) denotes the input power level where the large signal gain
has dropped by 1 dB due to the compressive and saturating nature of the circuit [Rou09].
The input/output relationship of the device is no longer linear, hence, the real output drops
off from the linear output power curve. Non-linear devices operating around the P1dB are
already heavily non-linear and cause severe distortions. Therefore, receivers should typically
operate below the P1dB with a certain back-off in order to avoid spectral regrowth and
signal distortion.
19
2 Non-linear Distortions
Intercept Points are one of the most common metrics describing the strength of circuit
non-linearity and became standard figures of merit in the RF and microwave community.
These are fictitious points, e.g. IP2 and IP3 in the power level diagram Figure 2.10, where
extrapolated linear and distortion products cross [VR03]. That is, the IMD product equals
that of the fundamental signal amplitude. In Figure 2.10, power of IMD products of second
and third order are illustrated in red and blue colour, respectively. The slope of these curves
depends on the order of the distortion term. Hence, the slope of the fundamental term is
1 : 1 (linear curve), and 2 : 1 and 3 : 1 for the IMD2 and IMD3 terms, respectively. In
other words, with increasing input power, the IMD products increase 2 (or 3) times faster
than the power of the fundamental frequency. Intercept points can be defined according to
the input or output power. For instance, the IIP3 denotes the input-referred third-order
intercept point, the OIP2 denotes the output-referred second-order intercept point. It is
noteworthy that the system power would compress before the input power reaches the power
of the intercept point. In case of memoryless non-linearity under weak signal conditions, i.e.
with a high back-off to the P1dB, there are simple relationships between the IMD power and
the corresponding IIP, as given in (2.2) and (2.3).
PIMD2 = 2Pin PIIP2
(2.2)
(2.3)
For memoryless systems, IIP3 is typically 10 dB higher than the P1dB [Rou09]. Also, a
system intercept point can be defined, which depends on the receiver line-up and describes
the overall intermodulation characteristics, or in general sense, the linearity of the system.
It is determined by various blocks linearity and gain, as well as their contribution in the
receiver line-up [Rou09].
Basic Performance Specifications are typically found in data sheets of non-linear devices
and base on raw-level numbers. They are either expressed in dBc, if there is some dependency
on the LO or interferer power level, otherwise in dB, dBm, or % [Rou09]. For instance, HD2
given in unit dBc means the power difference between the fundamental (or carrier) frequency
to the second harmonic. Similarly, IMD3 in dB denotes the power difference between the
fundamental and the one of the third-order IMD products. Moreover, there are other figures,
such as the total harmonic distortion, often used in acoustics, that describes the harmonic
performance. It is defined as the ratio of the sum of powers of all harmonic components to
the power of the fundamental frequency in %.
20
Linear curve
OIP2
OIP3
IP3
IP2
Real
P1dB
1 dB
3
2
1
1
Input power (dB)
P1dB IIP3 IIP2
Figure 2.10: Power level diagram illustrating typical metrics for non-linear circuits.
AM/AM and AM/PM are transfer functions modelling the amplitude and phase of the
fundamental signal with increasing input [VR03]. AM/AM measures the non-linearity on
basis of the fundamental signal that comprises a strong linear term. However, very small
non-linear effects will be seen on top of it due to common good linearity of systems. Similarly,
the AM/PM is typically very small and at the order of 1 to 2 at full power and approaches
zero with decreasing power. Therefore, both metrics are highly sensitive to measurement
errors and seldom used in practice. It is easier and more robust to measure metrics based
on the generated distortion terms, such as the intercept points.
Metrics for Wideband Signals are, e.g., adjacent channel power ratio (ACPR),
noise power ratio (NPR), and multi-tone intermodulation ratio (M-IMR) [Ken00]. Previous metrics were originally defined based on narrowband signals, therefore, representing
only a narrowband approximation of real bandwidth-dependent systems. However, metrics describing the effects of non-linearity for wideband modulated signals are available.
ACPR denotes the degree of signal spreading, i.e. spectral regrowth by any odd-order
IMD, into an adjacent channel. NPR is a measure of unwanted in-channel distortion
power, found by examining the level of distortion filling a spectral gap in the input
signal, that has been generated with a notch filter before. The M-IMR, often used in
21
2 Non-linear Distortions
orthogonal frequency-division multiplexing (OFDM) systems, is defined as the ratio of the
wanted tone power to the highest IMD power.
Frequency
Figure 2.11: Typical signal configuration with weak desired and strong blocker signal.
22
23
2 Non-linear Distortions
reflected waves. The latter one also includes possible interstage mismatches in the input and
output ports. The most recent circuit-level model is the X-parameter model as a non-linear
extension of S-parameters, invented by Agilent Technologies Inc. [Vye10; VRW+05].
Behavioural models are extracted from input-output observations and enable complete
system-level simulations. They are preferred in most cases, especially when no equivalent
circuit description is available [Sch09]. However, simulation results are sensitive to the model
structure and the parameter extraction method, thus, behavioural models have a drawback
of generalisation. In other words, they are accurate for the data set used for its extraction
and most likely for the same excitation class, but are not guaranteed to provide useful results
for a different data set [TGT+96]. For example, applying a broadband input to a model
that has been extracted with narrowband excitation intuitively produces wrong results and
is equivalent to assume the superposition principle for non-linear systems which is of course
wrong [Sch09]. It is likely that there are unknown aspects of response-based behavioural
models as technological attributes are omitted in the model. The closer the model matches
the real front-end architecture, the more robust and accurate will be the prediction of the
behavioural activity under all kinds of excitations and environmental conditions. A detailed
classification of behavioural models according to application, model structure, and amplifier
physics is given in [Sch09].
A major distinction of behavioural models is made between lowpass or bandpass equivalent
models [Sch09]. Physical (circuit) models work directly with the actual RF signal which
contains the full RF circuits bandpass nature. Lowpass or BB equivalent modelling processes
only the complex envelope of the actual information signal, its carrier frequency is basically
neglected. This type of system-level modelling is computationally efficient and matches also
to the application of mitigating non-linear distortion at system level.
A further classification of behavioural models is conducted based upon the memory characteristics of the underlying non-linear component into:
memoryless (only AM/AM),
quasi-memory (AM/AM and AM/PM), and
memory models [Sch09].
Memoryless models consider only static and frequency-independent AM/AM distortion, thus,
no previous values are considered. Quasi-memory models additionally include AM/PM distortion that manifest instantaneous memoryless non-linear phase distortion effects. Examples for memoryless models are complex power series (polynomials), Saleh model and
modifications of it, Fourier series model, and Bessel-Fourier model, among others [Sch09].
24
25
2 Non-linear Distortions
From the system-level point of view on memoryless non-linear models, the output envelope
simultaneously reacts to the input envelope, represented by amplitude and phase. That is,
there is a static non-linear relation between the input x(t) and the output y(t) given by
(2.4)
y(t) = G [x(t)] .
Here, G denotes the complex transfer function of the non-linear device and can be written
as
G(A) = g(A)ej(A) = P (A) + jQ(A),
(2.5)
where g(A) is the AM/AM distortion and (A) represents the AM/PM distortion. The
complex BB signal is represented by
x(t) = A(t)ej(t) = xI (t) + j xQ (t),
(2.6)
where A(t) and (t) are the general envelope amplitude and phase components, and xI and
xQ are the I and Q-component of the excitation signal. Equation (2.5) is also referred to as
quadrature model, constituting a general form of a memoryless non-linear model [Sch09]. A
functional schematic of such a quadrature model is depicted in Figure 2.12.
P (A)
x(t)
y(t)
90
Q(A)
N
X
(2.7)
n=1
where cn are complex-valued coefficients and x(t) being a real-valued input (e.g. I- or Q
component of complex envelope x(t)). Equation (2.7) represents a memoryless polynomial
at RF passband. Here, the output signal as polynomial expansion of the instantaneous input
has been truncated after N coefficients. With complex coefficients cn in (2.7), phase shift
in narrowband systems is also modelled, thus, also memory effects are considered to some
26
Equation (2.7) can be transformed to its equivalent BB representation with the complex
envelope input x(t) to [KK01; Teh09]
y(t) =
N
X
n=1
cn x(t) |x(t)|n1 ,
(2.8)
by assuming that some zonal filtering is adopted, hence, only odd-order distortion terms
around the carrier frequency fc contribute to the output signal [MMK+06]. The coefficients
are then given by
1
n
cn = n1 n+1 cn .
(2.9)
2
2
A detailed derivation is given in Section A.1.
Typically, real-valued coefficients are assumed for the polynomial (2.7), where relations with
the intercept points can be easily deduced [ZMS09; Che11]. The coefficients can be derived
by applying the definition of the intercept points, namely the equality between the linear
term and the IMD2 and IMD3 term, respectively. The following derivation is based on a
two-tone excitation of a non-linear device of degree 3. Assuming a linear gain of
G|dB = 20 log10 c1 ,
(2.10)
the corresponding relations of input-referred second-order intercept point (IIP2) and IIP3
are
c1 AIIP2 = c2 A2IIP2 ,
3
c1 AIIP3 = c3 A3IIP3 ,
4
(2.11)
(2.12)
AIIP2 and AIIP3 are the peak voltage levels at the corresponding power levels of the intercept
points that cannot be reached in practice. The coefficients on the right result from the square
and cubic operation (cp. Table 2.2). Converting IIP2 and IIP3 powers in dBm to voltages
and inserting (2.11) and (2.10) yields the desired relation between the intercept points and
27
2 Non-linear Distortions
the polynomial coefficients
IIP2|dBm
IIP3|dBm
A2IIP2
c21
= 10 log10
= 10 log10 2
,
2 R 103
c2 2 R 103
4 c1
A2IIP3
= 10 log10
,
= 10 log10
2 R 103
c3 3 2 R 103
(2.13)
(2.14)
where R is the reference resistance for converting W to V and is assumed to be 1 for sake
of simplicity (system-theoretic resistance). For extracting the model coefficients out of the
intercept points, inverse formulas are desirable
G
c1 = 10 20 ,
s
c2 =
(2.15)
c21
IIP2 ,
2 R 103 10 10
4 c1
c3 = ()
IIP3 .
3 2 R 103 10 10
(2.16)
(2.17)
Note that the third-order coefficient c3 is always negative. This kind of model extraction
based on intercept points will be discussed in Section 2.7.2.
In the following subsections, BB equivalent modelling with memoryless polynomials for individual receiver components as well as the total RF chain of a typical DCR, as illustrated in
Figure 2.6, is discussed. This approach has not been considered in the state-of-the-art literature so far. Indeed, the RF front-end is generally modelled to be ideal when evaluating the
performance of a communication system, and the receiver non-linearity is often just modelled
as an additive white Gaussian noise (AWGN) source [Sch08]. Moreover, all the models are
originally introduced for PAs, because the PA non-linearity at the transmitter is considered
to be the major source of non-linearity in the whole transmission chain [Sch08]. As seen
in the next sections, modelling of receiver RF front-ends can be fairly different to a single
transmitter amplifier. For instance, the impact of frequency conversion by the mixer is considered therein for developing appropriate BB representations of the distortion terms. This
novel approach of modelling the complete DCR chain has been published in [GAM+14].
28
LP
VGA
ANT
LNA
LP
yRF
(t)
xRF (t)
RF non-linearity
ADC
LO
90
BP
ADC
VGA
yRF (t)
ejc t
xRF (t) = 2 Re x(t)ejc t = x (t) ejc t + x (t)ejc t ,
(2.18)
where c = 2fc is the angular RF carrier frequency and (.) denotes complex conjugate.
Note that x(t) may contain multiple carriers of multiple co-existing radio access technologies
at different complex IFs, especially the desired signal among other strong interferers (see
Section 2.4). The RF non-linearity is then modelled by a memoryless polynomial according
to (2.7), outputting the signal
yRF (t) = c1 xRF (t) + c2 x2RF (t) + c3 x3RF (t) + . . . + cN xN
RF (t)
(2.19)
that is still including HD and IMD at passband [Sch09]. Now, some significant simplifications
are made that simplify the derivation of a BB representation of (2.19).
29
2 Non-linear Distortions
First, the RF carrier frequency fc is typically significantly higher than the maximum envelope
frequency of x(t) [Sch09]. That is, harmonics and even-order distortion are likely to be filtered
out when translated to BB, obtained by the so called zonal filters (typically lowpass)
adopted in the analogue or digital domain at BB [Sch09]. Moreover, signals may also be out
of the down-conversion bandwidth of the mixer.
Second, due to typically low IIP2 values, even-order distortion is very weak and generates
signal components near DC or at frequencies very far from fc [Raz97; Raz09]. They are
not harmful, except if the RF front-end is extremely wideband and xRF consists of multiple
strong signals that occupy a large bandwidth. Even-order distortion in the DC zone may
leak through the mixer to BB without frequency translation, as discussed in Section 2.2.
However, these issues have been reduced significantly due to integrated circuit design and
differential signalling [Kar01]. They can also be effectively filtered out by alternating current
coupling or filtering. Instead, odd-order distortion products can fall into the original signal
band (fundamental zone) as depicted in Figure 2.8. In practice, the third-order non-linearity
is usually the strongest and the only one that generates distortion that clearly appears above
the noise level. Thus, (2.19) can be simplified to
yRF
(t) = a1 xRF (t) + a2 x3RF (t),
(2.20)
where a1 = c1 denotes the linear gain and a2 = c3 the third-order coefficient of the RF
amplifier. In fact, operating at large-signal conditions demand for larger number of terms,
however, higher-order coefficients are difficult to extract as they cannot be separated out
from lower-order coefficients. In other words, many terms of the complex power series (2.19)
give simultaneous spectral contribution. The coefficients a1 and a2 are chosen to be complex
to model also static AM/PM distortion. By inserting (2.18) into (2.20), a further analysis
of the new frequency components can be performed:
yRF
(t) = a1 x(t) + 3 a2 x2 (t)x (t) ejc t
+ a1 x (t) + 3 a2 x (t) x2 (t) ejc t
+ a2 x3 (t)ej 3c t
+ a2 x3 (t)ej 3c t .
(2.21)
Only the first term ejc t will remain after mixing and zonal filtering at BB, i.e. by multiplying
(2.21) with ejc t as illustrated in Figure 2.13. The BB representation of (2.20) after zonal
30
A block scheme of the RF non-linearity model, derived from (2.22), is depicted in Figure 2.14.
x(t)
a1
(.)2 (.)
y(t)
3a2
Figure 2.14: Block scheme of the RF non-linearity model derived from (2.22).
The second form comprises a notation with the envelope x(t)x (t) = |x(t)|2 = A2 (t). This
exactly matches to the complex polynomial notation of (2.8) for n = 1, 3. Indeed, same
assumptions about filtering have been assumed in the derivation (cp. Section A.1). In the
last form, z(t) is introduced to enhance readability for the following joint modelling of RF
and BB non-linearity. Expanding (2.22) with (2.6) and separating in-phase and quadrature
component leads to
yRF,I (t) = a1 xI (t) + 3a2 x3I (t) + xI (t)x2Q (t)
yRF,Q (t) = a1 xQ (t) + 3a2 x3Q (t) + xQ (t)x2I (t) .
(2.23)
(2.24)
Next, a two-tone simulation has been conducted to illustrate the derivation. The complexvalued BB signal x(t) according to (2.6) is
x(t) = ej1 t + ej2 t ,
(2.25)
with the tones frequencies f1 = 6.4 MHz and f2 = 7.9 MHz relative to the carrier frequency
fc = 50 MHz. The RF spectrum is depicted by Figure 2.15(a), where only the RF carrier
of the two-tone signal is marked. Both tones have an equal power of 23 dBm, resulting in
a total power of 20 dBm. The noise power has been set to a particularly small value of
about 200 dBm in order to make also weak IMD after subsequent distortion at BB visible.
31
2 Non-linear Distortions
fc
PSD (dBm/Hz)
PSD (dBm/Hz)
40
20
0
fc
20
40
60
80
100
120
140
160
180
100 80 60 40 20
20
40
0
RF Frequency (MHz)
(a) Real-valued RF passband signal with two-tone signal at
trum.
40
20
0
20
40
60
80
100
120
140
160
180
200
(3fc + 3f1 )
80
100
3fc + 3f1
100
Fundamental
3rd order IMD
15
2f1 f2
f1
f2
f1 + 2f2
PSD (dBm/Hz)
50
0
50
100
150
RF Frequency (MHz)
(b) RF passband distortion with zonal filter marked in green colour.
40
20
0
20
40
60
80
100
120
140
160
180
20
150
60
10
0
5
10
15
20
5
Baseband Frequency (MHz)
(c) BB equivalent representation of RF distortion after zonal filtering.
32
Frequency
Type
9 a2 + a1
+1
Fundamental
9 a2 + a1
+2
Fundamental
3 a2
22 1
3 a2
21 2
Note that the amplitude of the fundamental frequencies is, beside linear gain a1 , weighted by
the third-order coefficient a2 which is always negative and causes the compression behaviour.
Distortion on top of the actual input signal is also denoted as in-band distortion from the
perspective/bandwidth of the input signal. The RF distortion at passband is illustrated
in Figure 2.15(b), assuming a1 = 2 and a2 = 1000, that corresponds to GRF = 6 dB
and IIP3RF = +6 dBm according to Equations (2.10) and (2.14). A bit exaggerated value
is chosen for the third-order coefficient a2 of the RF non-linearity for the sake of better
visualisation. The band of interest after zonal filtering (green frame in Figure 2.15(b)) is
illustrated in Figure 2.15(c). Hence, only the third-order IMD around the fundamental
frequencies is left from the distortion introduced by a single RF amplifier (LNA).
(2.26)
33
(2.27)
(2.28)
2 Non-linear Distortions
where yRF,I = a1 xI and yRF,Q = a1 xQ , i.e. fully linear amplification at the RF amplifier is
assumed for a moment. Indeed, the non-linear characteristics of the I and Q channels can
be modelled as a sum of two bandpass non-linearities [LHG+10]. Following the modelling
approach for the RF non-linearity, similar simplifications are made. First, even-order distortion is assumed to be very weak due to efficient circuit design techniques such as differential
signalling [Kar01]. In typical DCRs, symmetrical electric wiring is adopted behind the LNA,
i.e. by using two signals V+ and V that are ideally 180 out of phase, i.e. V+ = V .
Following [Kar01], the output or differential voltage can be written as
Vdiff = V+ V ,
(2.29)
where the time-dependency of the voltages is omitted for a moment. Then, assuming perfectly balanced signals, both voltages can be written as
V+ = c1 V+ + c2 V+2 + c3 V+3 + . . . + cN V+N
(2.30)
(2.31)
according to (2.27) or (2.28). Note that the pair (2.30) and (2.31) have the same form for
both I and Q component, so appropriate subscripts are omitted here. Eventually, the odd
order terms keep their sign, but the even-order distortion is always positive. Computing Vdiff
according to (2.29) yields
Vdiff
= V+ V = 2c1 V+ + 2c3 V+3 + . . . + 2c2n+1 V+2n+1 .
LP
VGA
ANT
ADC
ADC
LO
90
BP
(2.32)
LNA
LP
VGA
34
3
yBB,I
(t) = a3,I yRF,I (t) + a4,I yRF,I
(t)
(2.33)
3
yBB,Q
(t) = a3,Q yRF,Q (t) + a4,Q yRF,Q
(t),
(2.34)
where a3,I = c1,I , a3,Q = c1,Q , a4,I = c3,I , and a4,Q = c3,Q for notational convenience in
the following derivation including both RF and BB distortion. A block scheme of the BB
non-linearity model is depicted in Figure 2.17.
yRF
yBB
a3,I
Re
(.)3
Im
a4,I
a3,Q
(.)3
a4,Q
Figure 2.17: Block scheme of the BB non-linearity model employing a cubic term separately
for the I and Q part.
Assuming a two-tone down-converted signal according to (2.25), the output components
after passing BB non-linearity are as listed in Table 2.2.
The BB distortion is illustrated in Figure 2.18, assuming a3,I = a3,Q = 2 and a4,I = a4,Q =
1000 similar to the RF distortion case. Beside IMD, the BB non-linearity generates also
HD directly in the BB on the left side of the spectrum at 31,2 , if the strong complex
carriers fall onto low (non-zero) IFs. Thus, HD cannot be neglected in the discussion as for
the RF non-linearity. Moreover, it is noteworthy that the BB non-linearity causes third-
35
2 Non-linear Distortions
Table 2.2: Frequency components generated by BB non-linearity.
Coefficient
Frequency
Type
9
4
9
4
a3 + a4
+1
Fundamental
a3 + a4
+2
Fundamental
a4
31
3rd order HD
21 2
(22 + 1 )
1
4
1
4
3
4
3
4
3
4
3
4
a4
a4
a4
a4
a4
32
22 1
(21 + 2 )
3rd order HD
3rd order IMD
3rd order IMD
50
2 f1 f2
f1
f2
f1 + 2 f2
PSD (dBm/Hz)
3 f2
(f1 + 2 f2 )
(2 f1 + f2 )
3 f1
50
Fundamental
3rd HD
3rd order IMD
100
150
200
30
20
10
0
10
Baseband Frequency (MHz)
20
30
Figure 2.18: BB distortion caused by two-tone input generates additional frequency components in the fundamental and third harmonic zone.
order IMD in the fundamental zone, at exactly the same frequencies of the RF distortion.
Considering the total receiver line-up of a DCR, both RF and BB distortion will sum up in
the fundamental zone, as will be shown later.
Considering only the third-order of the received signal is the main approach followed in the
state-of-the-art literature, such as in [GSH+12a; VSHGA+06]. However, it is restricted for
modelling non-linear systems at equivalent BB. Down-conversion by the mixer and subsequent distortion of RF distortions at BB are not considered therein that is one of the research
gaps tackled in this thesis and being on focus in the next section.
36
yBB,I
(t) = a3,I a1 xI (t) + 3a3,I a2 zI (t)
(2.35)
and
yBB,Q
(t) = a3,Q a1 xQ (t) + 3a3,Q a2 zQ (t)
(2.36)
Equations (2.35) and (2.36) can be further opened by applying (2.23) and (2.24). Hence, a
BB representation of the total RF and BB distortion is obtained with relation to the input
signal x(t) (2.6):
yBB,I
(t) = a3,I a1 xI (t) + 3 a3,I a2 x3I (t) + 3 a3,I a2 xI (t)x2Q (t)
(2.37)
and
yBB,Q
(t) = a3,Q a1 xQ (t) + 3 a3,Q a2 x3Q (t) + 3 a3,Q a2 xQ (t)x2I
37
(2.38)
2 Non-linear Distortions
Note that due to the cascade of two third-order polynomials, i.e. two non-linear devices
of degree three in series, up to ninth order IMD is considered. The equations (2.37) and
(2.38) clearly show the interaction between the RF and BB stages. Figure 2.19 depicts a
simplified block scheme of the joint model considering RF and BB distortion as a cascade of
two third-order polynomials.
ejc t
LNA
xRF (t)
(.)
BB
yRF
(t)
yRF (t)
(.)
yBB
(t)
Figure 2.19: Model of joint RF and BB distortion using a cascade of two third-order
polynomials.
Again, a two-tone excitation is assumed and signal components generated by the cascaded
50
100
150
200
30
20
4 f2 + 5 f1
3 f2 + 4 f1
2 f2 + 3 f1
2 f1 f2
f1
f2
f1 + 2 f2
(2 f1 3 f2 )
(3 f1 4 f2 )
(4 f1 5 f2 )
PSD (dBm/Hz)
6 f2 + 3 f1
5 f2 + 2 f1
f1 4 f2
3 f2
(f1 + 2 f2 )
(2 f1 + f2 )
3 f1
f2 4 f1
(5 f1 2 f2 )
(6 f1 3 f2 )
50
10
0
10
Baseband Frequency (MHz)
Fundamental
3rd HD
3rd order IMD
5th order IMD
7th order IMD
9th order IMD
20
30
38
a4 a1 a2 2 +
a4 a1 a2 2 +
a4 a1 a2 2 +
729
4
243
4
243
4
Frequency
Type
+1
Fundamental
+2
Fundamental
31
3rd order HD
21 2
32
22 1
(21 + 2 )
(22 + 1 )
a4 a2 3
a4 a2 3
a4 a2 3
a4 a2 3
a4 a2 3
a4 a2 3
1 42
21 + 32
31 + 42
2 41
a4 a2 3
3rd order HD
22 + 31
32 + 41
51 + 22
42 + 51
62 + 31
52 + 21
41 + 52
61 + 32
been excluded in this particular simulation to make also high-order distortion visible. In
practice, 7th- and 9th-order non-linearity are below the receiver noise level or beyond the
signal-to-noise ratio (SNR) of the ADC. The SNR of a typical ADC is approx. 6080 dB,
hence, making all signal components below 80 dBFS to disappear due to the quantisation
noise.
Moreover, it is visible that the level of third-order IMD in the fundamental and third harmonic zone do not match. That is, RF non-linearity initially generated some additional
third-order distortion power around the fundamental frequencies as already seen in Figure 2.15(c).
39
2 Non-linear Distortions
(2.39)
(2.40)
k2 = (1 gm e+jm )/2.
(2.41)
Figure 2.21 depicts the mixer I/Q imbalance model. In the previous derivations, perfect I/Q
yRF
k1
(.)
yRF
k2
yBB
(t) = yBB,I
(t) + j yBB,Q
(t)
3
3
= a3,I yRF,I (t) + a4,I yRF,I
(t) + j a3,Q yRF,Q (t) + a4,Q yRF,Q
(t) ,
40
(2.42)
yRF,I =
yRF,Q
+
yRF (t) +
yRF (t)
yRF
(t)
8
8
a4,I + a4,Q
3a4,I 3a4,Q
yRF (t) [
yRF
(t)]2 +
[
yRF (t)]3 .
+
8
8
yBB
(t) =
(2.43)
This equation needs to be further expanded with (2.39) to get the complete representation
of the BB distortion including mixer I/Q imbalance (k1 6= 1, k2 6= 0) and further imbalance
between the I and Q receiver chains (a3,I 6= a3,Q and a4,I 6= a4,Q ). The full form is given by
(t)
yBB
a3,I a3,Q
a3,I + a3,Q
=
k1 +
k2 yRF (t)
2
2
a3,I a3,Q
a3,I + a3,Q
k2 +
k1 yRF (t)
+
2
2
i
i
a4,I a4,Q h 3
a4,I + a4,Q h 3
2
2
3
+
yRF
(t)
k1 + 3k1 (k2 ) +
(k2 ) + 3k1 k2
8
8
i
i a +a h
a4,I a4,Q h 3
4,I
4,Q
2
3
2
+
[yRF
(t)]3
k2 + 3(k1 ) k2 +
(k1 ) + 3k1 k2
8
8
i
a4,I a4,Q h 2
3 k1 k2 + |k2 |2 k2 + 2|k1 |2 k2
+
8
i
a4,I + a4,Q h 2
2
2
2
+
3 k1 (k2 ) + |k1 | k1 + 2|k2 | k1 yRF
(t)yRF
(t)
8
i
a4,I a4,Q h
3 k1 k2 2 + |k1 |2 k1 + 2|k2 |2 k1
+
8
i
a4,I + a4,Q h 2
2
2
+
3 (k1 ) k2 + |k2 | k2 + 2|k1 | k2 yRF (t)[yRF
(t)]2 .
(2.44)
8
According to (2.22), yRF (t) contains the original signal x(t) and its RF distortion, hence, both
41
2 Non-linear Distortions
and separating in I and Q component. Assuming perfectly aligned I and Q paths (a3,I = a3,Q
and a4,I = a4,Q ) reduces (2.44) to
3
1
(t)]3 + a4 yRF
(t)yRF
(t).
yBB
(t) = a3 yRF (t) + a4 [yRF
4
4
(2.45)
In the following, two-tone simulations are performed to demonstrate the impact of the imbalance effects and their interaction with the RF and BB non-linearity. The used parameters
are summarised in Table 2.4. One important parameter is the IRR, the receivers ability to
suppress mirrors of the RF signal to be I/Q down-converted. The value is set to 40 dB, which
is a realistic value for a typical DCR as will be seen later in measurements. Moreover, a small
Table 2.4: I/Q imbalance simulation parameters
IRR 40 dB
a3,I
gm
0.99
a3,Q
2.2
0.0174 1
a4,I
1000
k1
k2
0.9949 j0.0086
a4,Q
0.0051 j0.0086
900
phase mismatch of the mixer has been assumed that results in complex mismatch coefficients
k1 and k2 according to (2.40) and (2.41). Slightly different third-order coefficients a3,I/Q and
a4,I/Q take also I/Q imbalance at the two physically separated I/Q paths into account.
After yRF (t) passes the mixer, mirror products of the fundamental tones and RF distortion
appear, as shown in Figure 2.22(a). Compared to Figure 2.15(c), only additional components due to the imbalance effects are highlighted. Feeding yRF (t) to the BB stages yields
the total RF and BB distortions under I/Q imbalance conditions according to (2.44). In
Figure 2.22(b), additional components compared to those in Figure 2.20 are highlighted.
Due to the imbalance effects, basically same frequency components are generated as listed
in Section 2.5.5, but all with negative sign (complex conjugates) and with reduced power
levels dictated by the IRR. In other words, the spectral gaps in Figure 2.8 are filled due
to the mirror effects. Note that also mixer non-linearity and further BB non-linearities can
be combined in the non-linear coefficients a3,I/Q and a4,I/Q . Different third-order coefficients
between the I and Q path result in different power levels of distortions, but same frequency
components are generated. It just denotes different scaling of the real and imaginary parts
that sum up in the complex-valued representation.
42
50
Mirror Fundamental
Mirror 3rd order IMD
f1 2f2
f2
f1
f2 2f1
PSD (dBm/Hz)
50
100
150
10
0
10
20
Baseband Frequency (MHz)
(a) RF distortion after passing a non-ideal mixer manifesting I/Q imbalance.
30
20
30
PSD (dBm/Hz)
0
50
100
150
200
250
30
20
6 f1 3 f2
5 f1 2 f2
f2 + 4 f1
3 f1
2 f1 + f2
f1 + 2 f2
3 f2
f1 + 4 f2
5 f2 2 f1
6 f2 3 f1
4 f1 5 f2
3 f1 4 f2
2 f1 + 3 f2
f1 2 f2
f2
f1
2 f1 + f2
2 f2 3 f1
3 f2 4 f1
4 f2 5 f1
50
10
0
10
30
20
Frequency (MHz)
(b) Further distortion at BB with I and Q paths incorporating different gain and third-order coefficients.
43
2 Non-linear Distortions
The most general model for describing both non-linearities and memory effects is the Volterra
series [VR03; Ken00; Pin01]. It provides a complete and reliable description of the non-linear
systems function by using multidimensional convolutions [Pin01]. A finite discrete-time
Volterra series model is given by [MMK+06]
y(s) =
yn (s) =
N
X
(2.46)
yn (s)
n=1
M
1
X
m1 =0
M
1
X
mn =0
hn (m1 , , mn )
n
Y
l=1
x(s ml ),
(2.47)
yn (s) being the n-dimensional convolution of the input with Volterra kernel hn . It is obtained
by combining the convolution sum of a linear time invariant (LTI) system, modelling the
memory, and the power series according to (2.7), modelling a memoryless non-linearity. Thus,
the set of Equations (2.46) and (2.47) is also called a power series with finite memory of length
M [Rou09]. The Volterra kernels denote different transfer functions (impulse responses) for
each order n. For n = 1, the kernel h1 (m1 ) coincides with a linear impulse response. Nonlinearity is characterised by any higher-order impulse response (n > 1), e.g. h2 (m1 , m2 ) and
h3 (m1 , m2 , m3 ) describe the second- and third-order non-linearity, respectively. However,
the Volterra model also has some drawbacks. First, the parameters increase with respect to
non-linear order N and memory depth M significantly, essentially complicating its practical
implementation. Second, high-order Volterra kernels are difficult to measure and convergence
of the Volterra series is also not guaranteed. Third, the Volterra model shows, due to
the Taylor series approximation, only good approximation at the point where it has been
extended, i.e. it suits for modelling weakly non-linear systems (mildly non-linear regimes)
[Sch09].
Next, some simpler memory structures are considered that model linear memory and constitute special cases of the general Volterra formulation.
44
x(s)
yW (s)
LTI
FIR filter
Polynomial
(a) The Wiener model (linear non-linear).
x(s)
yH (s)
LTI
FIR filter
Polynomial
Figure 2.23: Two-box models as simplifications of the Volterra series model [Sch09].
n = 1, 2, . . . N
(2.48)
N
X
cn
n=1
"M 1
X
m=0
h(m)x(s m)
#n
(2.49)
On the contrary, the Hammerstein model, which is formed by a static non-linearity followed
by a common linear filter h(m), can be written as
yH (s) =
M
1
X
m=0
h(m)
N
X
n=1
cn xn (s m).
(2.50)
m1 = m2 = = mn ,
otherwise,
(2.51)
cn h(m)
0
i.e. the kernels are only non-zero along their diagonals [Sch09].
45
2 Non-linear Distortions
The Hammerstein model acquires special significance since this structure is used later in
the mitigation architecture (Chapter 4). Finally, all modelling of non-linearity is still
based on memoryless polynomials, but memory effects are considered by a cascade with
an adaptive filter (AF) manifesting the linear subsystem.
The model memory depth M determines the length of the finite impulse response (FIR) filter
adopted in these models. It can be estimated from the first-order Volterra kernel. There are
several approaches to obtain the linear and non-linear block coefficients, the most common
being the least squares (LS) method from broadband time-domain measurements. Details
on that and of further structures, such as the three-box Wiener-Hammerstein model or the
parallel-cascade models, can be found in [Sch09].
N M
1
X
X
n=1 m=0
an,m xn (s m),
(2.52)
where {an,m } denotes a combination of different filter and polynomial coefficients cn into a
2D-array. By assuming that the signals bandwidth is small compared to the centre frequency
fc , the real input signal can be expressed by its complex BB representation x and yields the
memory polynomial, similar to (2.8),
yM P (s) =
1
N M
X
X
n=1 m=0
(2.53)
Note that (2.53) ends up in a memoryless polynomial model according to (2.8) for M =
0. The memory polynomial can be seen as a parallel structure of different Hammerstein
subsystems. Equation (2.53) can be simplified further by taking only the odd-order terms
2(n 1) as the even-order terms fall at frequencies very far from fc . A block scheme of a
memory polynomial is shown in Figure 2.24. The unit delay tap is depicted by the symbol
46
x(s)
a1,0 aN,0
z 1
x(s 1)
a1,1 aN,1
z 1
y(s)
z 1
x(s M)
Linear dynamic
subsystem
a1,M aN,M
Non-linear static
subsystem
z 1 and introduces a delay of one sampling interval m (unit time delay). The total number of
parameters is N M, hence, easing the implementation of this model significantly compared
to other memory models [Dup12].
The complex polynomial coefficients an,m can be estimated by the LS method from L samples
of the complex envelope BB signal. Assuming that input and output signal are collected in
two vectors x = [x(0), x(1), . . . , x(L 1)]T and y = [y(0), y(1), . . . , y(L 1)]T , the matrix R
is given by
R = [R0 , R1 , . . . , Rm ] ,
h
i
Rm = xm , xm |xm | , xm |xm |2 , . . . , xm |xm |N 1 ,
xm = [x(0 m), x(1 m), . . . , x(L 1 m)]T ,
47
(2.54)
2 Non-linear Distortions
where a is the vector with the complex polynomial coefficients an,m arranged as a =
[a1,0 , . . . , aN,0 , a1,1 , . . . , aN,1 , . . . , a1,M . . . , aN,M ]T . The LS solution for (2.54) is
a = RH R
1
RH y,
(2.55)
where (.)H denotes the Hermitian transpose of the matrix R [Sch09; Dup12]. A development
of a memory polynomial model based on measured data is discussed in Section 2.7.3.
In the TDNN approach, the memoryless non-linear subsystem is modelled by an artificial
neural network. However, as it is trained to a given data set, its usability for other data is
questionable. The interested reader is referred to [Sch09].
48
From workspace
input_signal
49
Solver
Config
f (x) = 0
SimRF
Import
SL RF
SimRF Blocks
LNA
Out
SimRF
Parameters
In
Gnd
Out Q
Mixer
RF In
Out I
Out
Out
IF-Amp
Quadrature
In
R2
IF-Amp
In-Phase R1
In
SimRF
Outport
Quadrature
RF SL
Gnd1
SimRF
Outport
In-Phase
RF SL
Re-Im to
Complex
Im
Re
To workspace
output_signal
2 Non-linear Distortions
1
RF input
In
Out
LO
2
I
Mixer I
In
Out
In
Out
LO
3
Q
Mixer Q
Phase
Shift
LO
50
Power (dBm)
20
40
TT Input
Cascaded Model
SimRF
RF+BB Distortions
Mirror-Frequency
BB Distortions
BB Distortions
(Mirror+TT)
60
80
100
120
10
5
0
5
Baseband Frequency (MHz)
10
Beside physical and behavioural modelling, real RF device measurements with realistic excitation signals can be conducted. There are two approaches to derive a mathematical model
out of measured data, namely mathematical modelling and system identification [Sch09;
Pin01]. In mathematical modelling, basic laws of physics are used to describe the systems
dynamic behaviour. However, the few physical insights are unlikely to work even with simple
single-stage receivers that are on focus in this thesis. Instead, the DCR should be modelled
as a whole. The idea of system identification is to fit a model to the data extracted from
empirical measurements, therefore, it is also called direct empirical modelling [Sch09]. It
requires less physical insight and eases the construction, but is limited in validity.
51
2 Non-linear Distortions
System Identification Procedure
First, available a-priori knowledge concerning the RF chain and the desired model application is used to determine the type of excitation signal, the measurement setup including the
measurement procedure and the operating range. Here, the main goal is to extract a simple
model that describes the non-linear behaviour of the receiver to optimise the performance of
the radio by RF impairment mitigation techniques. In general, the test signal should excite
all possible states of the non-linear front-end (persistent excitation) [Sch09]. The numbers
of coefficients should be chosen in a way that enough degrees of freedom are available that
describe the full range of the front-end behaviour. After parameter extraction from the
measured data, the model is typically validated by using other data than in the extraction
process. There are some factors that may lead to a deficient model [Sch09]. The measurements may not provide sufficient information or are too noisy, e.g. if the ADC quantisation
noise covers higher-order distortion products. Next, the model may be inappropriate to represent the front-end behaviour, e.g. if the order is too low or too high. Finally, the model
identification algorithm itself may fail to extract the parameters correctly.
Excitation Signal
There are several different types of excitation signals that can be used for system identification techniques [Sch09]. These are single-tone, two-tone, multi-sine, band-limited noise,
pseudo-noise, or digitally modulated signals. In addition, the excitation signal is typically
swept over the input frequency and power range of the device under test (DUT) to capture
its complete behaviour.
The excitation signal class plays a key role for extracting a valid model. For instance, the
IMD caused by a two-tone interferer will differ from the IMD caused by a wideband digitally
modulated signal. The distortions, and hence the frequency response of the DUT, depend
on the amplitude distribution of the excitation signal [Pin01]. In order to get the best linear
approximation, it is important to use the same kind of excitation in terms of power spectrum
and amplitude distribution as will be applied later during operation of the radio [TGT+96].
Otherwise, the approximation can become invalid. Assuming a fully memoryless behaviour,
the excitation signal does not need to match the application signal, however, swept-frequency
response should be measured to establish the band limits of the memoryless property.
52
Model Extraction
A memoryless polynomial model according to (2.7) can be directly extracted by the intercept
points obtained by prior RF measurements. Intercept points provide a good indication of the
degree of non-linearity under simple signal conditions [Ken00], whereas digitally modulated
signals allow only for little insight in the operation of the analysed system. The points are
typically found by extrapolation of the IMD power against different input powers. That is,
fundamental and IMD product are plotted in a power level diagram and intercept points are
found by graphical intersection of their extrapolated curves.
Measurement Setup
The two-tone measurement setup is sketched in Figure 2.28. The two-tone signal is generated by two individual signal generators, whose outputs are combined by a power splitter in reverse mode. A controllable attenuator is used to set the desired signal power
and to provide enough isolation of the individual tones. Finally, the signal is fed to
the USRP2+WBX, the non-linear DUT. Generators and attenuator are connected via
general purpose interface bus (GPIB), a control bus for instrumentation and measurement
that enables full-automated operation. Moreover, the setup enables coherent sampling by
53
R&S SMIQ06
2 Non-linear Distortions
f1 = fc + 570 kHz
at 14 dBm
attenuator
020 dB
power
combiner
RX
TX USRP2+
WBX
phase-locked
REF
R&S SMHU
ETH
PC
GPIB
phase synchronisation (10 MHz reference) between the generators and USRP. This is essential for avoiding spectral leakage and for obtaining absolute power levels. Note that the total
RF front-end non-linearity is captured as a whole and determined by the FFT spectrum of
the digitised BB signal. Thus, the sinusoidal frequencies are chosen as integer multiplies of
an FFT bin that represents the sampling grid in the frequency domain with
fbin =
fs
,
NFFT
(2.56)
where fs and NFFT denote the sampling frequency and the FFT length, respectively. Indeed, the FFT can be interpreted as a filter bank with the bandwidth fbin in each channel.
The higher the FFT length, the lower the channel bandwidth of the FFT a behaviour like
the resolution bandwidth of a spectrum analyser. By choosing the tone frequencies within
the FFT grid, its powers are concentrated on single FFT bins and allow for proper power
detection. Moreover, the frequencies should be kept small so all distortions, especially those
in the third harmonic zone, remain within the BB bandwidth. Finally, the distortion products at the sum- and difference frequencies of the two tones will also fall onto FFT bins.
In order to avoid spectral leakage, integer number of signal periods should be obtained, in
this case N tp = N 1/fbeat = 2N/(f1 + f2 ), where fbeat denotes the beat frequency of
the two-tone complex envelope. The spectral leakage can be further reduced by adopting a
54
Results
Figure 2.29 illustrates an example of the received BB spectrum at 472 MHz and 13 dBm input power. Beside second and third-order IMD in the fundamental zone, also BB distortions
in the third harmonic zone are visible. In addition to that, there is a mirror frequency due
to mixer I/Q imbalance, as well as a DC offset that results from the ADC offset and the LOmixer feed-through (see Section 2.2). Due to the dominating RF distortion, third-order IMD
products in the fundamental zone have been used for extracting the model coefficients. A
gain loss of the RF front-end of 16 dB from the lower to the higher end of the frequency range
has been observed and compensated by a reduced attenuation. A little imbalance between
the upper and higher IMD3 products is visible, that indicate some memory effect.
The corresponding power level diagram at 472 MHz is illustrated in Figure 2.30. The measured fundamental and IMD powers are depicted in straight lines, whereas its extrapolated
curves have dashed lines. The extrapolation is done by simple polynomial fitting with the
assumed slopes of 1 : 1, 1 : 2, and 1 : 3 for the fundamental, IMD2, and IMD3, respectively
55
2 Non-linear Distortions
PSD (dBm/Hz)
20
40
60
TT Response
IMD3
IMD2
TT Input
LO Leakage
Mirror-Frequency
BB Distortions
80
100
120
140
4
1
0
1
2
Baseband Frequency (MHz)
Figure 2.29: BB spectrum of a two-tone excitation measured at 472 MHz and 13 dBm with
USRP2+WBX [Ett].
(see also Section 2.3.2). The measurement of the IMD power levels is challenging as the RF
front-end is quite linear in general. Thus, clipping distortion at the ADC occur before the
IMD products reach a measurable level. That is, the high distortions at around the P1dB
are mainly induced by clipping. The resulting power level for P1dB, IIP2, and IIP3 in this
case are: 11 dBm, 64 dBm, and 11 dBm, respectively.
The results obtained for the intercept points over the total receiver operating bandwidth
are illustrated in Figure 2.31. Apart from the small notch for IIP2 at around 1.7 GHz, the
non-linear behaviour is approximately frequency-independent and static over the input signal
band. The average values for the intercept points are IIP2 59.7 dBm and IIP3 13.0 dBm.
Assuming an RF receiver gain of G = 10 dB, the real coefficients cn in Equation (2.7) can
be computed by (2.15), (2.16), and (2.17) to the values in Table 2.5.
Table 2.5: Extracted coefficients of the memoryless polynomial.
Parameter
Value
10 dB
IIP2
59.7 dBm
IIP3
13.0 dBm
c1
3.1623
c2
0.0734
c3
106.0839
56
80
60
40
20
0
20
40
60
80
100
120
140
60
Clipping
Ideal Fund
Real Fund
IMD3
IMD3 Polyfit
IMD2
IMD2 Polyfit
P1dB
IP3
IP2
40
20
0
20
Input Power (dBm)
40
60
80
Figure 2.30: Power level diagram at 472 MHz highlighting the power of the IMD products
including their extrapolation.
80
IIP2
IIP3
70
60
(dBm)
50
40
30
20
10
0
200
400
600
57
2 Non-linear Distortions
16
14
Probability
12
10
8
6
4
2
Probability
0
0.2
5
4.5
4
3.5
3
2.5
2
1.5
1
0.5
0
0.15
0.1
0.05
0.05
0.1
0
Amplitude (V)
(a) Single-tone signal (PAPR = 3 dB).
0.15
0.2
8
7
Gaussian
Distribution
Probability
6
5
4
3
2
1
0
0.4
58
WCDMA Signal
In [Dup12], a memory polynomial model has been developed for the USRP with WBX
front-end. Here, the explicit goal was to check the DUT for memory effects by inputting
a wideband test signal with fast varying amplitude (high PAPR). For that purpose, a
59
2 Non-linear Distortions
Distorted Signal
Input Signal
PSD (dBm/Hz)
20
40
Mirror Frequency
Blocker Signal
IMD
Desired Signal
60
80
100
120
8
2
0
2
4
Baseband Frequency (MHz)
Figure 2.33: Distorted BB spectrum with multi-tone input, measured with USRP
N210+WBX [Ett].
wideband code division multiple access (WCDMA) signal has been used that is adopted in
the Universal Mobile Telecommunications System (UMTS) standard, better known as the
third generation mobile cellular system.
The measurement setup is sketched in Figure 2.34. The WCDMA signal is generated in
MATLAB by modulating random binary data with an offset-quadrature phase-shift keying
and subsequent raised-cosine filtering. In WCDMA, the user data at relatively low rate is
spread over a much wider bandwidth of 5 MHz, by using a sequence of pseudo-random units
called chips (3.84 Mcps).
Next, the generated signal is uploaded to the signal generator R&S SMU200A that has
an integrated AWG for replaying and up-converting the provided I/Q sample data stream.
Signal generator and the non-linear DUT, USRP+WBX, are synchronized by a 10 MHz
Input signal (AWG)
PC
ETH
R&S
SMU200A
WBX
USRP
N210
10 MHz reference
Figure 2.34: WCDMA Measurement setup.
60
and the sampling rate of the DUT were 120 MHz and 25 MHz, respectively. A complete
WCDMA frame length of 10 ms has been captured (250 000 samples in total). This high
number of samples has been used for reasons of accuracy. After reception, the output data is
aligned according to the input data by correlation. The amplitude distribution (histogram)
is depicted in Figure 2.35. As just the modulation (waveform) is generated without taking
2.5
Probability
Gaussian
Distribution
1.5
1
0.5
0
1
0
0.8 0.6 0.4 0.2
0.2
Amplitude (V)
0.4
0.6
0.8
Figure 2.35: Amplitude distribution of the measured WCDMA signal (PAPR = 5.1 dB).
into account the specific WCDMA frame structure, the output signal is not Gaussian. It has
a moderate PAPR of 5.1 dB in order to avoid CD at the receiver. Figure 2.36 illustrates the
ideal input and measured output WCDMA spectrum. It clearly shows the generated IMD
in the fundamental zone.
Next, a memory polynomial (2.53) is extracted out of this WCDMA measurement.
First, the memory depth M and the polynomial order N need to be estimated [FB11;
WLR+06]. This is done by the method of false nearest neighbours [Dup12]. That is, the
normalised mean square error (NMSE) between the measured output y and the model estimation y
M P is evaluated until a preset criterion is reached. The NMSE is defined as
NMSE|dB = 10 log10
kek22
kyk22
(2.57)
where kek2 = ky y
M P k2 . Figure 2.37 depicts the error obtained for different polynomial
61
2 Non-linear Distortions
20
PSD (dBm/Hz)
30
Ideal Input
Measured Output
40
50
60
IMD
70 (Spectral Regrowth)
80
90
100
10
5
0
5
Baseband Frequency (MHz)
10
Figure 2.36: BB spectrum of the input and output WCDMA signal at 120 MHz and
16 dBm.
25 dB is achieved. The NMSE decreases only slightly further for M = 2 and onwards. In
order to compare the results with the memoryless polynomial extracted in Section 2.7.2,
N = 3 and M = 1 are chosen. The complex coefficients are computed by the LS method
according to (2.55). The only critical point is the matrix inversion in (2.55), whose accuracy
is expressed in terms of the condition number. Orthogonal memory polynomials have been
proposed in [Dup12] that have lower conditions numbers. However, the NMSE performance
of conventional and orthogonal memory polynomial are almost identical for the obtained
data. For the aforementioned WCDMA data set, the computed coefficients of the memory
polynomial are
0.1031 + j0.0868
0.7569 + j0.4423
(2.58)
Note that the second-order coefficients are very small, thereby validating the low significance
of the even-order distortion studied in earlier measurements. In Figure 2.38, both memory
and memoryless polynomial models are visually compared based on the captured BB spectrum. The NMSE of the memoryless and the memory model are 4.5 dB and 26.2 dB,
respectively, indicating a significant improvement of the memory model for wideband excitation, even though the magnitude response looks identical. There is only a significant
small difference outside the triple bandwidth of the signal. However, this is due to the realvalued coefficients of the memoryless polynomial that cannot mimic the phase distortion
of the receiver. A validation with the time domain signal yields that there is a significant
phase mismatch of the waveform predicted by the memoryless polynomial, compared to the
62
15
MP N=3
MP N=5
MP N=7
NMSE (dB)
20
25
30
35
40
45
50
0
8
10
12
Memory Order M
14
16
18
20
Figure 2.37: Error of memory polynomial modelling for different polynomial orders N and
increasing memory order M obtained with a measured WCDMA signal.
20
PSD (dBm/Hz)
0
20
Measured Output
Memoryless Polynomial
Memory Polynomial
40
60
80
100
120
140
10
5
0
5
Baseband Frequency (MHz)
10
63
2 Non-linear Distortions
64
3 Mitigation Techniques
This chapter presents various techniques to handle front-end non-linearity and its effects.
Thereby, linearisation techniques for transmitter non-linearity are also briefly discussed, to
justify that they are inadequate for alleviating receiver-induced distortion. Next, suitable
approaches to mitigate receiver non-linearity are classified and evaluated regarding their
efficiency and limitations. Afterwards, state-of-the-art Dirty RF techniques, that denote
system-level techniques to alleviate RF impairments, are presented briefly. In general, this
chapter studies two main techniques to handle receiver non-linearity in detail. These are
preventing non-linear distortions by cancelling the blocker signal and mitigating the distortion products. Although the digital feedforward mitigation is on focus in the thesis and
detailed in Chapter 4, analogue cancellation and spatial filtering of strong blocker signals
are discussed as alternative solutions.
3.1 Overview
3.1.1 Transmitter Non-linearity
Mitigating PA non-linearity at the transmitter side has been tackled for decades. Although
it does not match to the research problem of mitigating receiver non-linearity, it is worth
studying the principles that are used therein. Finally, mitigation at transmitter and receiver
side can be clearly distinguished.
There is a huge number of circuit-level techniques for RF PA linearisation that can be
classified into three main categories [Ken00]
Feedback techniques,
Feedforward techniques, and
Predistortion.
The following paragraphs briefly discuss these techniques from an abstract level. For implementation details, the interested reader is referred to [Ken00].
65
3 Mitigation Techniques
Feedback systems intuitively cancel the error by feeding back a reference signal formed
upon the output, as illustrated in Figure 3.1. The distortion d(t) is mitigated by the fraction
d(t)
Input
e(t)
Output
Non-linear amplifier
Feedback
path
Figure 3.1: Feedback applied around a non-linear PA generating distortion [Ken00].
K/G, the ratio between the voltage division factor of the feedback path K and the gain
G of the original amplifier. However, linearity is achieved at the expense of overall gain
of the linear signal that is reduced to the factor K, constituting an inherent drawback of
feedback systems [Ken00]. Moreover, high G is typically required to allow using high K.
High gain is fairly difficult to achieve at RF frequencies and justifies the wide application
of feedback systems for audio amplifiers, where gain is easily achieved at low frequencies.
Instead, RF amplification is much more demanding, especially due to the higher frequencies,
higher bandwidth, and more tight linearity requirements.
There are several variants of feedback linearisation techniques, such as passive feedback,
envelope (modulation) feedback, polar feedback, and cartesian feedback [Ken00]. Passive
feedback denotes feedback around the transistor circuit of the amplifier and is typically
applied for gain levelling, as it improves only the linear distortion. Thus, it does not improve
any IMD or HD. There are also approaches feeding back only new generated frequency
components (IMD and HD) that in turn does not improve linear distortion. Envelope or
modulation feedback a predistorted version of the BB input before actual up-conversion. The
polar feedback adds a phase correction loop and is able to compensate for amplitude and
phase distortion. The cartesian loop, being the most common feedback technique, is similar
to the polar feedback, but the BB signal is now processed in I and Q. As the cancellation or
error signal e(t) is generated at BB, it requires up- and down-conversion.
Feedforward linearisation, as depicted in Figure 3.2, is less addressed in literature, most
likely due to its high complexity and tight amplitude and phase matching requirements for
66
3.1 Overview
Main amplifier
Input
Output
Correction loop
Error loop
Error amplifier
f
f
Figure 3.2: Configuration of a basic feedforward PA, sketching the signal flow by two-tone
input [Ken00].
all its components. However, it is discussed here as its digital counterpart is implemented
in this thesis (see Chapter 4). The input signal is split into two paths, whereas the top path
constitutes the main amplifier that generates HD and IMD. Next, a part of the non-linear
output is taken by a directional coupler and subtracted from a time-delayed version of the
input. The signal flow is sketched with two-tone signals in Figure 3.2, but only IMD of up to
5th order is illustrated here due to reasons of simplicity. As a result, an error signal remains
that contains only the distortion in the ideal case. Finally, the error signal is amplified by
the error amplifier and fed to the output coupler to cancel the distortion in the main path.
Both main and error amplifier introduce some delay that need to be compensated by delay
elements, denoted by , in the mutual paths. Beside exact amplitude and phase matching
at RF frequency and full signal bandwidth, the error amplifier needs to be distortion-free.
Otherwise, new distortion by the error amplifier is generated at the output. These issues have
a strong impact on the overall mitigation performance. Another drawback of the feedforward
system is its inability to measure its own performance due to the lack of intrinsic feedback.
67
3 Mitigation Techniques
Output
Input
Predistorter
Non-linear
PA
Figure 3.3: Principle of BB predistortion, indicating that expansive and compressive curve
result in a linear characteristic.
characteristic. Variants of predistortion (RF, IF, or BB predistortion) are classified according to the placement of the predistortion block in the transmitter chain. BB predistortion
or digital predistortion (DPD) is the most common approach and is illustrated in Figure 3.3
[FB11; BBC88; BCG+10; ZWC10]. On the contrary to the RF or IF predistortion, it relaxes
the burden on the non-linear inverse block, because the BB signal is manipulated before upconversion. Furthermore, feedback can be adopted to provide updating of this block. In
general, predistortion has the ability to linearise the entire bandwidth, however, finding a
circuit with expansive (third-order inverse) characteristic may be difficult. But, shifting the
model of a non-linear inverse to BB is much more beneficial and modern radio transceivers
anyway employ some form of DSP in their BB processing. Following this approach also enables adaptive predistortion to handle updating and accuracy problems that are in common
for all the linearisation techniques. Successful DPD applications have been reported, e.g. in
[BCG+10; ZWC10]. In [BCG+10], a Hammerstein model with static polynomial coefficients
has been developed, whose coefficients stem from a co-simulation between RF and BB-DSP.
An adaptive DPD approach has been followed in [ZWC10], that employs adaptive filtering
for finding the coefficients.
A main advantage of mitigating transmitter non-linearity is that the actual input and respective wanted output is always perfectly known. This holds for all aforementioned techniques.
Attempts of postdistortion in the receiver fail or perform worse due to the lack of knowledge of the original transmitted signal. Therefore, mitigating distortion in the receiver is
much more challenging, as the original input is to be estimated first. That might be one
reason why the receiver side is much less considered in the state of the art. In [Ken00], the
possibility of postdistortion in the receiver is also briefly discussed, but worse performance
has been reported due to the aforementioned reason. Also, the postdistortion model need to
be trained according to some known signal configurations, such as a vacant channel that is
68
3.1 Overview
filled by IMD of two adjacent channels. Finally, postdistortion at the receiver can only assist
prior predistortion at the transmitter and relax the performance of the mutual linearisation
techniques. Another problem is that only a single non-linearity is taken into account here,
namely the PA non-linearity. Modelling frequency-conversion effects and cascaded non-linear
systems with higher-order distortion terms, such as contained in a typical DCR front-end
line-up, seems to be impossible with these techniques. Beside adaptive BB distortion, most
of the approaches are not taking into account temperature drifts, component ageing, or any
change in the non-linear characteristic. Due to these reasons, an online-adaptive approach is
highly desirable. Finally, most of the approaches have constraints on the signal bandwidth
or modulation the feedback or feedforward path can handle.
Design Optimisation includes all circuit-level techniques to generally improve the linearity
of the front-end. This is achieved, e.g. by utilising highly linear components in the RF frontend chain. Thus, the level of HD and IMD is reduced and the front-end can tolerate higher
input power. But, there are strict limitations due to ever increasing demands for lower
voltages, scaling, etc. [Sch08]. In addition, using highly linear amplifiers can be problematic
for battery-powered terminals, as such amplifiers are typically very energy-inefficient [DF12].
There is always a trade-off between linearity and power consumption. For mobile terminals,
low cost and low power consumption is typically desirable.
Another example for improving the linearity of receiver front-end by circuit design is the use
of 3 dB hybrids and a balanced amplifier, as illustrated in Figure 3.4 [Sha]. Here, the input
power is split into two paths that are 90 out of phase, amplified by two separated identical
amplifiers, and finally combined again. By applying this technique, the intercept point and
the P1dB are bootstrapped by 3 dB. The 3 dB hybrids can be also replaced by conventional
power splitters. The advantage of 90 hybrids is that reflections by the amplifiers due to
impedance mismatch are passed on to the matched input/output of the hybrids. Thus,
perfect matching is achieved outside the balanced amplifier, that can be beneficial for the
following receiver components. However, 90 hybrids are typically frequency-selective and
not suitable for all applications.
69
3 Mitigation Techniques
In
90
90
Out
70
3.1 Overview
just mentioned here selected approaches are discussed in the next section in more detail.
The received signal can be equalized at symbol level with, e.g., embedded training or pilot
symbols [DS07; Chi11; Sch08], but also blind estimation may work [DKF10; DF11; DF12].
The performance may be also improved by an iterative detection at symbol level using the
Turbo equalisation principle [DSA09]. Also, digital postdistortion with a non-linear inverse,
i.e. a DPD counterpart, can mitigate distortion, but seems to be less reasonable with an
inaccurate model. The approach followed in this thesis depicts a feedforward architecture
and regenerates distortion products with the help of a reference model and subsequently subtracts them from the received signal [VSHGA+06; KH08b; AMV10b; GSH+12b; GSH+12a;
GAM+14].
Efficiency and Limitations Not all of the aforementioned techniques are reasonable and
really effective in practice. First of all, any modification of the front-end circuit is typically
not desirable due to reasons of cost, complexity, and flexibility. Indeed, it is also not in line
with the SDR concept. Although analogue approaches have a great potential for avoiding
blocking conditions, circuit non-linearity is more efficiently improved by system-level techniques [Chi11]. In addition, the technological development in the digital domain still rises
according to Moores law, hence, more and more signal processing tasks are shifted into
the digital domain. However, analogue circuitry is still much faster than digital circuitry
[KH08a]. Moreover, implementation of mitigation techniques by digital circuitry has the
advantage of insensitivity to process variations [KH08a].
Simple filtering of out-of-band blocking signals may work as long as the distortion products
are not in the band of interest. In that case, filtering should be employed directly at the
RF input prior any non-linear component. This becomes difficult for multi-carrier or multichannel receivers, where HD and IMD can hit the target band. If the distortion products
have fallen onto the band of interest, more sophisticated signal processing becomes necessary
rather than ordinary linear filtering [VSHGA+06]. Furthermore, tunable selective analogue
filters are difficult to implement.
The proposed digital feedforward technique in its purely digital implementation also has some
fundamental limits (see also Section 4.5). It requires that all distortion-producing carriers
are available in the digital domain. Accordingly, the ADC needs to pass the full spectrum of
potential problematic blockers within a frequency range much larger than the original signal
bandwidth [KH08b; KH09b]. Hence, multiple RF chains or wideband digitisers are required.
Although most of the approaches are blind mitigation techniques that do not require a
training sequence or detailed knowledge of the interfering signal, they will fail under overload
71
3 Mitigation Techniques
conditions. Moreover, the distortion regeneration is affected by a non-ideal reference signal
that is subjected to in-band distortion. Nevertheless, these techniques are most attractive as
no exact knowledge of the non-linear distortion profile, the input waveforms, or the desired
signal is needed.
Finally, only mixed-signal solutions will complement each other and provide the best mitigation performance. For instance, the purely digital feedforward correction can be assisted
by some relaxed filtering at the input in order to avoid overload conditions.
x =
s + d,
(3.1)
which states that non-linearity causes a scaling of the wanted signal and introduces an
additive error term that is typically treated like additional noise. Different variants for
calculating the convolution of the PDFs are discussed with regard to its computational
complexity, aiming for a real-time implementation in LabView based on USRP [DF12].
72
Detector
Modulator
x =
s + d
Figure 3.5: Decision feedback detector with estimated receiver non-linearity [DF11].
A good mitigation performance in terms of SNR and bit error rate (BER) is reported
therein, especially in case the real-world behaviour matches to the amplifier model considered in the detector. In real RF measurements, approx. 36 dB improvement in the
signal-to-interference ratio including noise and distortion (SINAD) and up to two orders of
magnitude in terms of the BER have been obtained. It is likely that the low SINAD improvement is due to the mismatch between the underlying amplifier model and the physical RF
front-end architecture. This issue is exactly one of the gaps that is treated in this thesis.
Two-channel receiver is proposed in [ZMS09] to jointly estimate the channel response and
non-linearity parameters by applying a-priori knowledge of the desired and blocker signal.
Figure 3.6 illustrates the proposed architecture, where the RF is split after the LNA into
two receiver chains. Alternatively, the signal may be split already at the antenna, to get
amplified by two individual LNAs. Thereby, cross-modulation distortion (see Section 2.3.1)
of a strong blocker on a weak desired carrier is explicitly addressed in context of SDR.
The custom receiver with two RF chains is employed for separated reception and downconversion of the blocker, however, only one blocker at a time can be considered. Finally,
the distortion term can be subtracted via LS and minimum mean square error estimation
with the knowledge of the blocker amplitude that can be tracked by a low speed and low
resolution auxiliary ADC in the second RF chain. Although this approach relaxes the burden
on a single wideband ADC to capture both weak and strong signals, it requires a separate RF
path for each blocker and increases the front-end complexity. The BER of an OFDM system
can be reduced by up to one order of magnitude, as shown by simulations in [ZMS09].
73
3 Mitigation Techniques
LO1
Desired Signal Path
ANT
ADC
BB
Processing
ADC
LNA
LO2
Figure 3.6: Two-channel wideband SDR receiver for acquiring wanted and blocker signal
[ZMS09].
Mixed-Signal Feedforward Mitigation by using a custom-designed RF front-end is proposed in [KH08b] and related references [KH08a; KH09b; KH09a]. The proposed architecture
is illustrated in Figure 3.7. Here, the main idea is to regenerate the third-order IMD products
Main Path
ADC
ANT
LNA
(.)3
ADC
Adaptive
Filter
Alternate Path
Figure 3.7: Mixed-signal feedforward mitigation with RF cubic-term generator highlighted
[KH08b].
at the analogue RF domain in an alternate path and to pass only problematic IMD products
down to BB in the same manner as the desired signal (using same LO). The processing and
adaptive filtering takes place at digital BB. Thus, digital BB and ADC requirements are not
greater than that of the main path. It generally solves the main limitations of purely digital
feedforward mitigation followed in this thesis, but also requires a lot of additional circuitry to
be implemented on chip. The main advantage of this approach is that all distortion products,
74
Digital Feedforward Mitigation has been first proposed in [VSHGA+06; gha11] and
is detailed in Chapter 4. This algorithm, illustrated in Figure 4.1, is working purely in
the digital domain. The main idea is to regenerate distortion products by specific strong
distortion-producing signals and to subtract them from the desired signal observation in an
adaptive manner. Since the error signal and reference model are never precisely known in
practice, an adaptive filter is used to subtract the reference signal from the main receiver
path. There is a gap in the state of the art with regard to the mitigation architecture. The
specifics in modelling of a complete RF chain of a DCR have not been considered so far. Up
to now, the non-linearity of the total RF front-end is modelled by a single polynomial. This
approach does not distinguish different types of RF and BB distortion and cannot capture
75
3 Mitigation Techniques
all distortion products generated by such front-ends. Therefore, the model is extended in a
way that it matches to the physical front-end architecture.
76
LNA
:2
2LO
77
3 Mitigation Techniques
ANT
f
ADC
LNA
BB
Processing
+
Replica
Generator
IF-A
LO
DAC
PA
LO
78
Proof-of-Principle Experiment
Nevertheless, some real RF measurements have been carried out in order to pursue the idea
and to discover the challenges of this technique in more detail. The setup is depicted in
Figure 3.10. For reasons of simplicity, only one blocker has been assumed that is static
over time. The actual blocker and its replica are generated by two individual USRP SDR
platforms, equipped with WBX daughterboard [Ett]. Random static phase offsets at USRP
generating the blocker replica have been adapted by a delay line. These offsets are caused
due to the FPGA-based processing on the USRP. A desired signal is generated by an AWG
and is coupled into the main receiver path. In this setup, the blockers amplitude and phase
are assumed to be perfectly known and both transmitting USRPs are fully synchronised by a
10 MHz reference clock and a pulse per second (PPS) signal. Finally, desired signal, blocker,
and replica are fed to a third USRP that acts as the actual receiver. In the final application,
the receiving USRP should be able to create the blocker replica by itself.
Figure 3.11 illustrates the measured BB spectrum before and after cancellation. Desired
79
3 Mitigation Techniques
Power
Combiner
Blocker Signal
RX
WBX+
USRP2
TX
WBX+
USRP2
PPS, REF_CLK
RX
RX
TX
Desired Signal
REF
Blocker Replica
Receiver
f
WBX+
USRP2
REF
AWG7102
f
TX
REF
Delay Line
80
PSD (dBm/Hz)
20
30
40
50
60
70
80
90
100
110
120
130
6
Uncompensated
Compensated
Blocker Signal
Desired Signal
LO Leakage
2
0
2
Baseband Frequency (MHz)
Figure 3.11: BB spectrum of the received signal before and after blocker cancellation.
in the direction of strong blockers can be generated after prior measurement of their angle
of arrival by sweeping the coefficients. Simultaneously, weak signals can be amplified by
imposing some higher gain in their angle of arrival.
Beside beamforming techniques, also a simple opportunistic choice of the best antenna is
thinkable. That is, all possible antenna diagrams are scanned and the optimal diagram with
the most suitable signal configuration of desired and blocker signal is just switched. In any
case, spatial filtering will support other digital mitigation algorithms by avoiding overload
conditions and relaxing the burden on the A/D interface.
Such interferences scenarios can be emulated using the setup for over-the-air testing in a virtual electromagnetic environment (OTAinVEE) build at Ilmenau University of Technology
[KGM+11; MKG+11; GKM+11a]. This testbed allows for emulating a realistic radio environment with reproducible signal scenarios for a single centred radio node, surrounded by
an antenna array in a circular arrangement. For details on this test approach, the interested
reader is referred to the aforementioned references.
Though, spatial filtering is likely to be effective, the approach is out of the scope of this
thesis and has not been pursued further.
81
3 Mitigation Techniques
a1
a2
LNA
IF-A
ADC
+
.
.
.
BB
Processing
+
Adaptive
Nulling
LO
aM
Figure 3.12: Wideband SDR front-end with antenna array for spatial filtering [CB05].
one includes Dirty RF signal processing, that represents a trendy system-level technique
to alleviate non-linear distortions. Beside receiver non-linearity, techniques for mitigating
transmitter non-linearity have been also discussed, as some principles are in common. Finally, a digital feedforward mitigation algorithm has been selected, especially due to its
simple integration and efficient post-correction of distorted BB signals in the receiver.
82
4.1 Principle
The key idea of the feedforward mitigation algorithm is taken from [VSHGA+06]. Figure 4.1
illustrates the algorithm in its general form. The signal flow is hereby illustrated by sketched
f
RF
xRF (t)
A/D
Digital Domain
d(n)
yBB (t)
Non-linear
Front-end
Band
Splitting
Delay
x
(n)
Reference
Model
Adaptive
Filter
e(n)
BB
Processing
Figure 4.1: Block scheme of the generalized digital feedforward mitigation algorithm.
BB equivalent spectra at different points along the signal processing chain.
83
84
4.1 Principle
This small band typically holds a weak carrier and does not occupy the whole BB bandwidth.
Then, in the upper branch, this single SOI is isolated using a bandpass. In contrast, in the
lower branch, the desired signal is filtered out and the remainder of the BB signal is used for
modelling the distortion falling into the desired band. In the last sketched spectrum, only
the desired signal remains (upper right spectrum in Figure 4.1).
On the other hand, the whole BB bandwidth is to be cleaned from distortions in the second
use case, e.g. to enhance the reliability of spectrum sensing techniques or for wideband BTS
receivers that simultaneously demodulate all down-converted carriers. A bandstop filter in
the upper branch filters out the strong blocker to provide a good desired signal for the
AF. Conversely, a bandpass filter in the lower branch isolates the strong blocker that is
used for distortion modelling. For applications like spectrum sensing, it is desirable to have
the strong blockers present after mitigation, because they can be also interpreted as useful
signals. These scenarios aim for an undistorted BB representation of xRF (t) at the antenna
input. In such a case, the blocker estimate x(n) needs to be added back after mitigation to
the error signal e(n), as it is indicated in Figure 4.1 by a dashed arrow. Finally, a cleaned
version of yBB
(t) is obtained, i.e. without the orange-coloured distortion components.
XMD between strong blockers and weak desired signals, as discussed in Section 2.3.1, are not
taken into account by this architecture. However, this specific kind of distortion is typically
weak compared to the IMD caused by dominating blockers [VSHGA+06]. Furthermore, it
is sufficient to isolate only the strongest blockers as they cause the most harmful distortion.
The amount of generated distortion always depends on the peak signal power present at
the input. By selecting specific distortion-producing signals, the distortion estimates will be
also more accurate, as no additional distortions are generated that are actually not present
in the received signal. Feeding a large band of signals through the reference path likely
causes unwanted distortions, depending on the actual power levels and frequency separations
between the carriers.
The mitigation processing in the lower branch, especially the filtering, introduces some delay.
To compensate for that effect, the same delay can be easily added in the upper branch. This
is one of the major advantages of performing this processing digitally compared to the main
drawback of the analogue blocker cancellation techniques discussed in Section 3.4.
For the simulation testbed, the three main components have been implemented in
MATLAB using an object-oriented design. This simulation framework is referred to as
non-linearly induced interference mitigation (NONLIM) algorithm and is detailed in Section C.1. In the subsequent sections, all components are discussed from the system-theoretic
point of view in detail.
85
4.2 Components
4.2.1 Bandsplit Filtering
The derivation of the desired and reference signal plays an important role for the effectiveness
of the adaptive mitigation processing, as their stopband attenuation dictate the spectral
purity of the input for the AF. That is, the filters should have a high slope to clearly separate
the blocker from the IMD and the remainder of the BB signal. The exact filter characteristics
particularly depend on the RF signal configuration and the underlying receiver front-end at
hand. If the scenario is known in advance, fixed filter settings can be used. Otherwise, the
filters need to be tuned accordingly by changing their coefficients during runtime. The first
case is valid for applications with one SOI, while the latter one should be considered for
highly dynamic scenarios like for spectrum sensing applications in CR.
For the spectrum sensing application, strong blockers near to desired signals or bands for
secondary transmissions can be identified in the first step by a coarse energy detector (Section 7.1). A threshold of 20 dB below the maximum input signal level has been found through
experiments and is assumed to be reasonable to detect all strong blockers. Thereby, the filter pair may consider a single blocker at a time or even multiple blockers by a multi-band
filter.
By filtering the blocker out of the input signal, an estimate x(n) of the originally transmitted
signal x(t) causing the distortions is obtained. However, the strong signal (or blocker) itself
suffers from non-linear distortion, so called in-band distortion. Therefore, the reference
distortions provided by the following reference model will differ from those in the upper
branch. This problem is discussed in detail in section 4.5.
The computational complexity of the filtering should not be underestimated. The filter pair
should have linear phase (or equivalently constant group delay), high stopband attenuation,
and unity amplitude response in the passband in order to not distort the signal further. These
characteristics are required for phase-sensitive communications and are fulfilled by FIRs with
symmetric coefficient sequences. Because FIR filters do not require any feedback, they are
inherently stable compared to their counterparts, the infinite impulse response filters.
Following Figure 4.1, a pair of a complex bandpass and bandstop filter is typically required,
especially due to the mirror-frequency interference occurring in any practical receiver. The
classical way of designing such filters is to frequency-shift a real-valued lowpass and highpass
FIR prototype, respectively. The following section will give a brief overview on FIRs. More
details can be found in literature, e.g. in [MB04; Hay02; Spt].
86
4.2 Components
FIR Filters are the most common LTI filters that act on the input through linear convolution [MB04]. Hence, the output is given by
H
y(n) = w (n)u(n) =
M
X
k=0
wk u(n k),
(4.1)
where M is referred to as filter order with the filter coefficients wk and corresponding input
u(n). The FIR filter architecture is depicted in Figure 4.2 in a transposed transversal form
[MB04]. This structure is also known as tapped delay line and consists only of the three
u(n)
w1
w0
z 1
z 1
w2
wM
y(n)
d
= const.
d
(4.2)
over a range of frequencies, if the filter is even- or odd-symmetric. Symmetric FIRs also
require only half the number of multipliers, constituting an important advantage for efficient
FPGA implementation.
FIRs are typically designed using direct computer specifications and algorithms, such as the
MATLAB Signal Processing Toolbox [Spt]. For this purpose, different algorithms are available, such as equiripple, Kaiser window design, or LS FIR method. Throughout the thesis,
the equiripple method following the Parks-McClellan optimal FIR filter design algorithm
87
cascade RF, mixer, and BB model that have been developed in Section 2.5. Hence, the total
model decomposes into several blocks. However, this structure will only work if the exact
coefficients are known a-priori. In fact, an online adaptation of all the model coefficients is
practically required, hence, AFs are included and depicted by gray-coloured arrows and the
88
yBB
(n)
hC
BP
hC
BS
3a2
a
1
+
RF Non-linearity Model
(.)2 (.)
x(n)
d(n)
k2
(.)
k1
Im
Re
89
a
4,Q
a
3,Q
a
4,I
BB Non-linearity Model
(.)3
(.)3
a
3,I
e(n)
4.2 Components
a3 a1 + 27
a a 2 a |z|2
2 4 2 1
3a3 a2 + 43 a4 a1 3 + 18
aaa2
4 4 2 1
1
aa3
4 4 1
4
5
6
7
8
9
9
aaa2
4 4 2 1
27
a a 2a
4 4 2 1
81
aa3
4 4 2
27
aa3
4 4 2
|x|
Term
I/Q Representation
xI + jxQ
z
3
(x )
x2 z
2
(x ) z
x z 2
x (z )
z2z
3
(z )
90
x3I + jx3Q
x2I zI + jx2Q zQ
2
xI zI2 + jxQ zQ
3
zI3 + jzQ
4.2 Components
to their power contribution in descending order, while the time variable t is omitted to
enhance readability. The last column in Table 4.1 provides the I/Q branch counterparts to
the complex terms, indicating that each term in I/Q form corresponds to two complex terms.
Doing the same analysis with I/Q imbalance included results in another nine terms that are
the complex conjugates of the terms listed in Table 4.1. In general, all distortion terms can
be considered if all of them have separate parallel branches. However, not all terms have a
significant contribution in practice, hence, the architecture can be simplified further.
Only the most significant distortion terms plus their complex conjugates should be considered in order to reduce the computational complexity and to overcome difficulties in the
adaptation process for weak terms having contribution below the noise power level. In addition, the terms should be carefully selected so they do not have much spectral overlap. The
final terms that have been selected for the parallel mitigation architecture are listed in Table 4.2. Hats () and the discrete variable n are used in the term notation to indicate that an
Table 4.2: Selected terms for parallel mitigation architecture [GAM+14].
No.
Term
Filtering
x (n)
SL
z(n)
WL
WL-RC
x (n)
estimate of the distortion-producing blocker signal x(t) has been obtained by filtering in the
digital domain. In fact, the blocker estimate x(n) also contains in-band distortion, a problem that is further detailed in Section 4.5. The third column indicates if the terms should
have strictly-linear (SL), widely-linear (WL), or reduced-complexity widely-linear (WL-RC)
filtering [GAM+14; ALA09]. This is related to the adaptive filtering implementation and
is discussed later in this section. They mainly differ in the number of complex terms to be
processed in the AF stage.
Term 1 holds the mirror of the blocker and has typically the strongest contribution that
can be easily assessed from the IRR of the receiver. Term 2 has contributions from RF and
BB non-linearity, and Term 3 is the BB distortion in the fundamental and third harmonic
zone. It is likely that the remaining terms are negligible due to 5th , 7th , and 9th order
terms. The previous terms have a maximum order of three and therefore represent the
most significant distortion that finally need to be subtracted from the desired signal with a
least-mean square (LMS) AF.
91
50
0
50
80 dBFS
1
2
3
4
5
6
100
150
200
10
5
0
5
Baseband Frequency (MHz)
(a) Dominating RF non-linearity.
50
Relative Power (dB)
Term
Term
Term
Term
Term
Term
0
50
80 dBFS
10
Term
Term
Term
Term
Term
Term
1
2
3
4
5
6
100
150
200
10
5
0
5
Baseband Frequency (MHz)
(b) Dominating BB non-linearity.
10
Figure 4.4: Power levels of distortion estimates Terms 1-6 of Table 4.1 [GAM+14].
is apparent that the Terms 2 and 3 are the most significant values in this case. Furthermore,
it is sufficient to consider the common spectral content of multiple terms by only one term,
as the AF adapts them to the total distortion at these frequencies. That is, only distortions
of higher-order terms need to be considered that have not been covered already by the
lower-order terms.
92
4.2 Components
Table 4.3: Parameters of the Two-Tone Simulation
Parameter
Value
10 dBm
IIP3RF
15 dB
GRF
IIP3BB
+6 dBm
10 dB
GBB
30 dBm
Pinput
In addition, SNR of the ADC is an important limiting factor for resolving weak distortion
terms. The SNR of a typical ADC is approx. 6080 dB depending on its resolution. Thus,
all terms below 80 dBFS are covered by the quantisation noise. Consequently, Terms 4-6
in Figure 4.4 are likely to be masked by noise in practice. Typically, the ADC quantisation
noise is stronger than noise introduced by the analogue RF front-end.
Figure 4.4(b) illustrates the case for dominating BB non-linearity with a
[3.16, 1588.7, 5.62, (84351 + j74391)], i.e. having |a2 | < |a4 |. These values result
from exchanging the IIP3s and gains in Table 4.3 of RF and BB stage to make the BB stage
the dominating non-linearity. Again, Terms 2 and 3 are the most significant ones and IMD
in the fundamental and third harmonic zone are almost equally strong, indicating that only
little RF distortion is present. Indeed, the order of the meaningful distortion terms can
slightly vary.
Finally, it is assumed that the selected distortion terms of Table 4.2 are sufficient for any
practical values of RF and BB non-linearities. However, the mitigation architecture can be
easily extended for front-ends manifesting a higher sensitivity, severe non-linearity, or both
that make the inclusion of higher-order terms necessary.
Another limiting factor for the practical non-linearity modelling is the ADC sample rate fs
used for the mitigation processing. The blocker should have a frequency less than fs /6 to
model third-order non-linearity without aliasing. The reason is that any third-order nonlinearity occupies three times the bandwidth of the distortion-producing blocker band.
As a conclusion of the aforementioned findings, a practical mitigation architecture is proposed
that is a carefully found compromise between the computational complexity and the achievable mitigation performance [GAM+14]. This architecture is proposed in Figure 4.5. Here,
Terms 1 to 3 are moved in parallel and manifest separate branches that are adapted simultaneously by multitap AFs to consider also frequency-selective nature of the non-linearities
(memory effects). Some branches employ a real bandstop, depicted by hR
BS in Figure 4.5,
93
yBB
(n)
hC
BS
hC
BP
e(n)
d(n)
x(n)
(.)
SL
w x
I/Q Imbalance
hR
BS
(.)2 (.)
wz
wz
wx3I
WL
(.)
RF Non-linearity
BB Non-linearity (I)
Re
(.)3
hR
BS
WL-RC
Im
hR
BS
w x3Q
BB Non-linearity (Q)
Figure 4.5: Parallel mitigation architecture for cascaded non-linearity [GAM+14].
that filters out the spectral content from the original blocker band. Otherwise, there is a
risk of misadjustment by the AF stages as the desired path d(n) does not hold any content
from the original blocker band. Different types of filtering have been implemented to find
a good trade-off between computational complexity and the additional complex conjugate
terms. For Term 1, x (n), SL filtering is deployed which means that one set of complex AF
coefficients w x is found. For Term 2, z(n), also the complex conjugate need to be included
to consider mixer I/Q imbalance effects. Therefore, WL is used to find two separate complex
sets of AF coefficients w z and w z . In addition z(n) need to be filtered to cancel the blocker
band content, whereas no filtering is necessary (or at least not harmful) for z (n) as it contains no signal content at the original blocker band. WL filtering is also used for Term 3, i.e.
x3 (n) and [
x (n)]3 . As both terms need to be filtered by hR
BS , the WL-RC approach can be
exploited, which means that finding two complex sets of coefficients for the complex signal
and its conjugate is equivalent to finding two complex set of coefficients for the real and
94
4.2 Components
imaginary part of that signal [ALA09; NNS10; GAM+14]. Hence, the complexity of WL is
reduced to that of SL. In other words, finding AFs wx3 and wx3c for
w x3 (n) x3 (n) + wx3c (n) [
x (n)]3
(4.3)
is equivalent to finding filters w x3I (n) and w x3Q (n) for real and imaginary parts of x3 (n), i.e.,
x3 (n)] + w x3Q (n) Im[
x3 (n)].
wx3I (n) Re[
(4.4)
Altogether, the computational complexity is reduced by factor two, because complex AFs are
applied for real-valued signals in (4.4) instead of complex-valued signals as in (4.3). Due to
the selected filtering approaches, there are in total five distortion branches in the mitigation
architecture of Figure 4.5. Note that due to the complex implementation of the AFs also
AM/PM distortion at the RF non-linearity, amplitude and phase mismatch at the mixer,
and I/Q imbalance in the physical I and Q BB branches are taken into account.
Single RF or BB Non-linearity
If the non-linearity of either the RF amplifier (LNA) or the BB amplifier is dominating, the
single type can be considered by just using a subset of the branches of the proposed parallel
mitigation architecture in Figure 4.5. Adopting just the BB non-linearity model, i.e. the
separated I/Q processing of the blocker raised to its third power, is exactly the procedure
followed in the prior work, such as in [VSHGA+06; gha11; GSH+12a]. RF-only modelling
has been adopted in [GSH+13; SGT13], assuming severe LNA non-linearity. In fact, the
BB-only model sufficiently mitigates the non-linear distortion if the receiver manifests only
very mild RF distortion. In Section 4.4, it will be shown that the proposed cascaded model
clearly outperforms the RF-only and BB-only model mitigation architectures.
95
Input Signal
u(n)
w0
Delay 1
z 1
y(n)
Error Signal
e(n)
w1
Delay M 1
z 1
Algorithm for
adaptive
or optimal design
wM 1
96
4.2 Components
reference distortions. In the following, it is discussed how the algorithms for an optimal or
adaptive design of the filter parameters wk look like.
X
k=0
wk (n)u(n k), n = 0, 1, 2, . . . .
(4.5)
The algorithm should find the parameters {w0 , w1 , w2 , . . . } such as to minimize the
mean-square error (MSE) defined as
J = E {e(n)e (n)} = E |e(n)|2 ,
(4.6)
i.e. the expectation value E {.} of the square of the error signal with
e(n) = d(n) y(n).
(4.7)
The criterion for the cost function J to attain its minimum is that the kth entry of its
gradient must be identically zero, that is
J
J
+j
ak
bk
e(n)
e (n)
e (n)
e(n)
=E
e (n) +
e(n) + j
e (n) +
e(n)
ak
ak
bk
bk
k J =
(4.8)
where the kth filter parameter wk is denoted in terms of its real and imaginary part wk =
ak + jbk . Equation (4.8) yields the fundamental principle of orthogonality, which states that
the error signal eopt (n) of the filter in optimum condition is orthogonal to the samples u(n)
of the AF input:
E u(n k)eopt (n) = 0, k = 0, 1, 2, . . . .
(4.9)
It can be also used to test if a given filter is operating in its optimum condition. As a
corollary of the principle of orthogonality, it can be shown that also the filter output yopt (n)
97
X
i=0
u(n k) d (n)
X
i=0
wopti u (n i)
!)
=0
(4.10)
In fact, the left side of equation (4.10) contains the autocorrelation function r(i k) of the
input at lag i k, and the right the cross-correlation p(k) between the filter input u(n k)
and the desired signal d(n). Replacing the expectations with the correlation functions yields
the famous Wiener-Hopf equations in its general form
X
i=0
(4.11)
Assuming now an FIR with M parameters (length of its impulse response) reduces equation (4.11) to a system of M equations. Then, matrix representation of the Wiener-Hopf
equations, now in complex notation, can be formulated with
u = [u(n) u(n 1) . . . u(n M + 1)]T
r(0)
r (1)
R = E u(n)uH (n) =
..
r (M 1)
r(1)
r(0)
..
.
..
.
r (M 2)
r(M 1)
r(M 2)
..
r(0)
where R is the autocorrelation matrix of the AF input in Toeplitz structure, i.e. it can be
built from the first row and first column vector only (symmetry along the diagonal). The
Wiener-Hopf equations in its compact form are then given by
Rwopt = p.
(4.12)
Assuming that the inverse R1 exists, the optimum tap-weight vector of the FIR is
w opt = R1 p.
98
(4.13)
4.2 Components
This solution can be obtained if the underlying statistics of the stationary process, meaning
the autocorrelation of the input and the cross-correlation of the input with the desired signal,
are known. The cost function in equation (4.6) can be written in matrix-vector representation
as
Jw = d2 2pH w + wH Rw,
(4.14)
thus, yielding the minimum MSE with the obtained Wiener-Hopf equations
Jwopt = d2 pH R1p.
(4.15)
(4.16)
From this equation, the adaptation mechanism can be formulated. The idea is to find a new
set of filter parameters by taking the old ones and adding something. By moving a small step
to the opposite site of the gradient vector ( in front of ), the parameters will approach
to those of the optimal Wiener filter, no matter where the iterations are initialized [Hay02].
Hence, the steepest descent algorithm can be written as
1
w(n + 1) = w w(n) J(n)
2
= w(n) + E {u(n)e (n)} .
(4.17)
This algorithm will track the time variations of the signals statistics without solving the
Wiener-Hopf equations every time the statistics change. Applying the steepest descent
method to the Wiener filter yields
w(n + 1) = w(n) + p Rw(n) .
(4.18)
Since the terms E {u(n)e (n)} and p Rw(n) are equivalent, an error-driven adaptation
process can be formulated. This is the basis for the common LMS algorithm, named by
its originators Widrow and Hoff (1960, [Hay02]). To simplify the algorithm further, the
99
(4.19)
(4.20)
In practice, exact measurements of the gradient vector are not possible, because this would
require prior knowledge of the correlation matrix of the inputs and the cross-correlation
between the input and the desired response.
Note that due to the efficient method of the steepest decent, actually no a-priori knowledge
of the non-linearity coefficients is necessary. Even if intentionally wrong values are used as
initial parameters, the LMS algorithm will converge to the true values very fast. That is, the
effort for detailed characterisations of the non-linearity is not necessary for this application.
It is more important to choose the core of the model in a way that it matches the physical
architecture of the front-end, as already mentioned.
Applying this simplification, computing correlation functions and matrix inversion are not
required any more. Algorithms based on 4.20 are simple to design and highly effective in
performance. As a consequence of equation (4.19), the adaptation suffers from gradient noise,
that is, there will be a random motion around the minimum MSE Jmin . A general result
and limit for LMS-AFs using only first order information is the slow rate of convergence,
however, they can react immediately to changes in the input signal statistics.
With properly set step size the parameters w and the MSE will converge to the Wiener
optimal solution, that is
w(n) w opt
J(w(n)) J(w opt ).
From the analysis of the convergence of the average parameter vector E {w(n)}, a stability
100
2
max
(4.21)
4.2 Components
where max is the largest eigenvalue of the autocorrelation matrix R = E u(n)uH (n) .
Indeed, the eigenvalues are not known in practice. If obeys this condition, the LMS
converges in mean to the Wiener solution. Another criterion for can be derived from the
convergence analysis of the MSE which yields
<
2
Power of the input
for J Jopt ,
(4.22)
where J is the steady-state value of the MSE. This relationship for can be used in
practical implementations as the power of the input can be easily determined. The choice
of a small is accompanied with a trade-off between convergence in speed and MSE. Using
a small , the adaptation progresses slowly while achieving a small misadjustment between
the steady-state MSE J and the minimum MSE Jopt . The reciprocal of can be viewed
as the memory of the LMS filter. Low causes long memory, that is, a large number of
samples need to be processed to reach a significant small MSE. Choosing a large results
in fast adaptation, but with increased misadjustment for the MSE.
There are several variants of the LMS algorithm, among others, the normalised LMS algorithm with the updating equation
w(n + 1) = w(n) + (n)u(n)e (n) with
=
(n) =
,
PM 1
2
+ ME {u(n)2 }
+ ku(n)k
+ i=0 u(n i)2
(4.23)
and a small constant > 0 (overcome numerical difficulties when ku(n)k is close to zero) as
well as the adaptation constant
. In the normalised least-mean square (NLMS) algorithm,
the step size changes every adaptation while taking the power of the input into account, that
is, the adaptation becomes data-dependent. The power is computed as the sum of squares
of the past M samples. Thereby, large fluctuations in the power levels and the length N of
the input vector by reducing the step size are considered. The stability condition for NLMS
reduced to the simple relationship
0<
< 2.
(4.24)
In fact, the small constant a also depends on the input signal power, that is, the NLMS
algorithm has 2 degrees of freedom, the numerical constant a and the adaptation constant
.
As a result of a direct comparison between LMS and NLMS, the normalised version achieves a
similar steady-state MSE but with faster convergence. Assuming similar convergence speed,
NLMS provides lower steady-state MSE. In other words, the NLMS offers better trade-
101
Alternative algorithms try to monotonically reduce the step size in such a way that a large
is used at the beginning for fast adaptation and a very small is applied at the end to achieve
a small MSE. However, these algorithms cannot react to changes of a non-stationary input
any more. Sign algorithms achieve a very fast adaptation by modifying the estimate of the
through replacing the multiplications with the sign of the error signal, the input,
gradient J
or both. Beside a fast convergence, the steady-state error will be higher. Further approaches
base on smoothing the gradient estimate by filtering, double updating by computing the filter
output with the old and new set of parameters, or the extension with quadratic combinations
of the input for filtering (LMS Volterra algorithm). For details on these algorithms, the
reader is referred to [Hay02].
102
4.2 Components
Assuming a set of distortion estimates samples ui and the desired signal vector d, the task
is to find the parameters wki of the linear filter with the output
yi (n) =
M
1
X
k=0
wki ui (n k) = w H
i (n)ui (n).
(4.25)
The estimation error is defined as the difference between the desired response and the filter
output [Hay02]
e(n) = d(n) y(n).
(4.26)
i2
X
i=i1
|e(i)|2 ,
(4.27)
that is, the sum of error squares, where i1 and i2 are the index limits where the minimisation
is done. While the error criterion of the Wiener filter in equation (4.6) used expectations, this
cost function is now closer to the actual data. To find the filter parameters w for the minimal
error emin when the cost function is minimized, a so called normal system of equations is
used [Hay02]. It can be derived by the gradient vector E or the principle of orthogonality.
The matrix formulation of these equations is
w = ,
(4.28)
where and are the correlation matrix of the input u and the cross-correlation vector
between the input and the desired signal, respectively. The tap-weights of the LS filter are
then
w = []1 ,
(4.29)
assuming that the inverse of exists. Equation (4.29) is the counterpart to the solution of
the Wiener-Hopf equations in equation (4.13). A compact form of equation (4.28) with the
actual data matrices is derived with the help of the following redefinitions:
= AH A
= AH d,
103
u(i1 )
u(i1 1) u(i1 2) u(i1 M + 1)
u(i1 )H
u(i1 + 1)
u(i1 )
u(i1 1) u(i1 M + 2) u(i1 + 1)H
,
=
A=
..
..
..
..
..
..
.
.
.
.
.
.
H
u(i2 )
u(i2 )
u(i2 1) u(i2 2) u(i2 M + 1)
(4.30)
where the limits i1 and i2 belong to a used data window. Equation (4.29) can then be
rewritten as
w = AH A
1
AH d,
(4.31)
containing only the known input and desired signal. This solution is equal to LS approximation of the general overdetermined system of equations in linear algebra [Str09]
Ax = b,
(4.32)
where A is a K M matrix and b a column vector of length K (K 1). The matrix A has
more rows than columns (K > M), which is the common case in this application. There are
many samples of input data, but only M unknown coefficients. Then there is a best x
which
minimizes the sum of squares of the errors in the K equations
kAx bk2
(4.33)
with
x
= AH A
1
AH b = A+ b.
(4.34)
x
yields the combination of the normal equations with the smallest MSE. In other words,
the estimate can be computed by the pseudoinverse (or Moore-Penrose generalized inverse)
1 H
A+ = AH A
A . Equation (4.31) and (4.34) are equivalent. In other words, x
fits the
distortion estimates to the sample vector in the LS sense, without having an AF taken into
consideration. The filter coefficients became here the unknown coefficients of a model, which
fits to the data.
Finally, the adjusted estimates can be subtracted from the desired signal, to get the cleaned
signal
x.
y = b A
104
(4.35)
4.2 Components
Attention has to be paid on the construction of the data matrix A. In the simplest case, it
contains the distortion estimate sample vectors in the columns. It is important to mention
that the condition number of A, indicating the accuracy for the matrix inversion, determines
the quality of the results for the found coefficients. A condition number of 1 indicates a
well-conditioned matrix. If it raises significantly, e.g. by adding more correlated distortion
terms in the columns, the LS solution differs a lot from the LMS solution. High condition
numbers basically mean that there are multiple solutions for solving the data fitting problem.
Therefore, also different coefficients by LMS and LS will be found.
Finally, the LMS algorithm is chosen instead of the LS method. The LS filtering requires a
long number of samples to provide useful results. For practical implementation, it is difficult
to store and process a high amount of data, and to subsequently correct the cached desired
signal with the found coefficients. Instead, the LMS algorithm with a continuous adaptation
at every sample instant is much easier to implement. However, the LS is computed in
simulations to compare it with the LMS solution.
Finally, a vector notation for mitigating cascaded non-linearity based on LMS-based learning
algorithm is given [GAM+14]. The special aspect for the non-linearity mitigation is that
multiple reference signals, the distortion estimates, need to be subtracted from the desired
signal at once. Furthermore, multi-tap AFs with a filter length M > 1 are typically required
to compensate also for memory effects in the non-linear receiver front-end.
Following Figure 4.5, there are in total five distortion estimate signals that can be combined
in one vector s(n) of size 5M 1, namely
s
x
sz
s(n) = sz
sx 3
I
sx3Q
(4.36)
where the subscripts indicate the distortion branches. For instance, Term 1 vector is
x (n), x (n 1), . . . , x (n M + 1)]T .
sx (n) = [
105
(4.37)
(4.38)
where zfilt (n) denotes the bandstop-filtered version of z(n). Next, also the AFs are combined
in one vector w(n) of size 5M 1 given by
w
x
wz
w(n) = w z
w x3
I
wx3Q
(4.39)
where the subscript indicates the corresponding distortion branch. Note that each individual
AF has a length M. Also different AF lengths for different distortion estimates can be employed, if e.g. RF and BB non-linearities manifest different levels of frequency-selectivity.
The combined AF output is then computed by
x(n) = w H (n)s(n),
(4.40)
(4.41)
where diag(.) denotes conversion of a vector to a diagonal matrix. Thereby, every distortion
estimate is processed by a different step size. They can be collected in a step size vector
i
h
= x , z , z , x3I , x3Q ,
(4.43)
where the subscripts indicate the corresponding distortion branches. Following the NLMS
algorithm according to (4.23) yields step-size vector
NLMS =
x
,...,
+ ksx (n)k2
106
x3Q
x3Q
2 ,
+
sx3Q (n)
(4.44)
# Ops.
Ref. Modeling
Mutiplications
Summations
Divisions
16
12P 8
8M
Static Filtering
12P
SL LMS
8M + 2
WL-RC LMS
8M + 2
8M
WL LMS
16M + 2
16M
NLMS Scaling
10M + 5
5M + 5
Overall
the distortion estimates is 16 real multiplications and 8 real summations according to the
complex-valued operations in Figure 4.5.
Add to this, there is the cost of the five filters applied in the mitigation architecture, namely
C
R
the two complex filters hC
BP and hBS and three instances of the real-valued filter hBS . If P
denotes the order of the direct-form FIR filters, P multiplications and P 1 summations
are necessary for real-valued filters, processing a real-valued signal [MRS91]. Same orders
are assumed for all filters, as same requirements in transition bandwidth and stopband
attenuation hold for all of them. Two instances of hR
BS process real-valued signals (BB nonlinearity branches), whereas all other filters operate on complex-valued signals. Multiplying
complex input with a complex tap weight requires 4P real multiplications and 2P + 2(P 1)
summations, where the 2P comes from the complex multiplications and 2(P 1) summations
from the parallel filtering of I and Q signals. Hence, the computational load of the two
C
complex filters hC
BP and hBS processing complex signals is twice that amount, i.e. 8P real
multiplications and 8P 4 summations. Then, there is one filter hR
BS operating on complex
signals, requiring 2P real multiplications and 2(P 1) summations for filtering the I and Q
branches. The remaining two real filters on real signals need 2P multiplications and 2(P 1)
107
for the tap-weight updating and the AF filtering, respectively, plus two summations in
the tap-weight update equation and the error signal equation. Hence, the total amount
of real summations for SL and WL-RC is 8M. The complexity for WL LMS is twice the
amount of SL LMS as two complex signals (strict and conjugate) need to be processed,
introducing 16M + 2 real multiplications and 16M summations. Including also the NLMS
update introduces additional 2M real multiplications and M real summations for computing
the euclidean norm plus 1 real division (Divs) and 1 real summation (with the numerical
constant) for finally scaling the step size. Thus, the additional amount for NLMS scaling
of five distortion estimates is 10M + 5 real multiplications and 5(M + 1) = 5M + 5 real
summations.
The final numbers of multiplications, summations, and divisions are summed up in the last
row of Table 4.4. The introduced processing delay of the digital feedforward mitigation is
P + M that is practically dictated by the filter order P , as P M.
In particular, the computational load is important for real-time implementation, as discussed
in Chapter 6, and for performance comparisons with other linearisation techniques.
108
RF3
I/Q
Imbal.
BB3I
BB3Q
yBB
Mitigation
Algorithm
e
FFT
AWGN
Figure 4.7: Simulation architecture for performance evaluation of the mitigation algorithm
in MATLAB [GAM+14].
109
(4.45)
where Yin and Ymit denote a matrix with the set of block-wise FFTs of the original input
and the mitigated output, respectively. The logical indices contain all bins of the FFT block
that do not belong to the blocker or mirror band. Compared to the BPSK case, definition
of the mitigation gain for the two-tone case is a bit different. Here, the gain is computed
explicitly at the actual frequency components containing the non-linear distortion, according
to the rule
Yin (spurs(s))
,
(4.46)
MGTT = 10 log10 mean
Ymit(spurs(s))
where spurs(s) is a vector holding discrete indices of the spurious frequency components
caused by the two-tone input. In addition, mirrors of the distortion products are considered
in simulations due to exaggerated coefficients used for the models. However, in measurements, these components do not appear above the noise level. Consequently, the absolute
mitigation gain obtained from simulations is a bit higher.
The parameters of the performance simulations are summarised in Table 4.5, extending the
values of Table 4.3. It lists all coefficients of the simulator model including the non-linearity
Table 4.5: Parameters of the performance simulations for mitigating cascaded non-linearity.
Parameter
Value
IIP3RF
10 dBm
GRF
15 dB
IIP3BB
+6 dBm
GBB
10 dB
Pinput
30 dBm
a
gm
m
and I/Q imbalance coefficients. In addition, phase distortions created by the LNA and the
110
111
replacemen
0
TT Input
Before Mitigation
10
After Mitigation
20
RF+BB Distortions
Mirror-Frequency
30
BB Distortions
40
BB Distortions
50
(Mirror+TT)
60
70
80
90
100
10
5
0
5
10
Baseband Frequency (MHz)
(a) Total cascaded non-linearity model.
0
TT Input
Before Mitigation
10
After Mitigation
20
RF+BB Distortions
Mirror-Frequency
30
BB Distortions
40
BB Distortions
50
(Mirror+TT)
60
70
80
90
100
10
0
5
10
5
Baseband Frequency (MHz)
(b) RF-only model.
0
TT Input
Before Mitigation
10
After Mitigation
20
RF+BB Distortions
Mirror-Frequency
30
BB Distortions
40
BB Distortions
50
(Mirror+TT)
60
70
80
90
100
10
5
0
5
10
Baseband Frequency (MHz)
(c) BB-only model.
Figure 4.8: Mitigation results with two-tone excitation obtained with different reference models [GAM+14].
112
wz
150
15
100
10
50
0
w x
0.04
wz
60
0.03
40
0.02
20
0.01
0
wx3Q
15
NLMS
5
LS
9 10
103
10
5
0
4 5 6
Samples
9 10
103
Figure 4.9: Adaptation of the AF coefficients with two-tone input (magnitude of complex
coefficients) [GAM+14].
model, no distortion mitigation is achieved here. On the contrary, in Figure 4.8(c), only the
blocker mirror and the third-order non-linearity at BB are considered (Terms x , Re [
x3 ],
and Im [
x3 ]). There is a poor performance of the BB-only model as the RF distortion is
not taken into account. Consequently, distortion products in the fundamental zone, but also
HD and IMD of the mirror image cannot be fully cancelled. However, if the RF and mixer
distortion is mild and does not manifest severe phase distortion (AM/PM), the BB-only
model can totally remove all occuring BB distortion. Finally, the joint processing of RF and
BB distortion clearly outperforms the RF-only and BB-only model considered in the state
of the art.
Additional simulations have been conducted which analyse the mitigation gain vs. the power
of the two-tone input obtained with the different models, to further proof the efficiency of the
total cascaded model. The achieved gain of the three models as well as the ideal suppression,
indicating how much spurious power has been added due to the receiver non-linearity, are
113
35
30
RF-only
BB-only
Cascaded
Ideal
25
20
15
10
5
0
50 48 46 44 42 40 38 36 34 32 30
Input Power (dBm)
Figure 4.10: Average suppression of non-linear distortion components for different mitigation
models obtained with simulated data [GAM+14].
generated up to the input power of 46 dBm. Here, only the blocker mirror x is dominating.
As all models include the blocker mirror mitigation, the blocker mirror band is excluded from
the mitigation gain calculations to enhance visibility of non-linear distortion mitigation. RF
and BB distortions raise with increasing input power and different gains are achieved with
different models. The BB-only model performs poorly due to the strong RF non-linearity,
whereas the total cascaded model follows the ideal suppression. That is, all non-linear
distortion products and mirror terms are essentially cancelled. In brief, the total cascaded
model provides much better performance than the RF-only or BB-only non-linearity models
due to their fundamental shortcomings. These results show that proper modelling of the
underlying receiver architecture is essential to achieve improved mitigation performance in
a broad variety of applications.
BPSK Blocker Input
Next, a BPSK-modulated blocker is assumed to show that the digital feedforward mitigation
algorithm is totally independent from the actual blocker waveform. The BPSK signal is
generated with a raised-cosine pulse-shaping filter, with a roll-off factor of 0.5, and a symbol
rate of approx. 788 ksym/s. These values have been chosen arbitrarily to generate a simple
modulated blocker that covers approx. 1 MHz bandwidth. Beside that, the parameters
for the BPSK simulation are exactly the same as listed in Table 4.5. The RMS power
has been chosen to be equal to that in the two-tone case. Due to the modulation, the
PAPR of the BPSK is with PAPRBPSK = 4.1 dB higher than that in the two-tone case
114
BB spectrum shown in Figure 4.11. The AF coefficients are converged after approx. 4000
0
10
20
30
40
50
60
70
80
90
100
BPSK Input
Before Mitigation
After Mitigation
Mirror-Frequency
BB Distortions
RF+BB Distortions
BB Distortions
(Mirror+BPSK)
10
5
0
5
Baseband Frequency (MHz)
10
4.4.2 RF Measurements
In order to verify the efficiency of the digital feedforward mitigation with true RF signals and
components, real-world measurements with the USRP+WBX front-end have been conducted
[Ett; GAM+14]. The automated setup for the experiments with the aforementioned signal
scenarios, similar to that employed in Section 2.7.2, is illustrated in Figure 4.13. The signals
were generated by the vector signal generator of type Rohde & Schwarz SMU200A. Before
running the actual measurements, the spectral purity (SFDR) of the generator was checked
with a conventional spectrum analyser, as they suffer from a limited linearity. The generator
itself has a SFDR > 80 dB, i.e. it can be guaranteed that all remarkable non-linear distortions
are solely generated in the non-linear DUT. Signal generator and receiver are synchronized
using a 10 MHz reference signal, enabling coherent sampling for precise power measurements.
The IIP3 of the total receiver RF front-end including RF, BB, and ADC non-linearity has
been determined already in Section 2.7.2 and are listed in Table 2.5.
115
wz
100
wx3I
15
80
10
60
40
20
0
0
w x
0.04
0.03
60
0.02
40
0.01
20
0
w x3Q
15
wz
80
NLMS
5
LS
9 10
103
10
5
0
4 5 6
Samples
9 10
103
Figure 4.12: Adaptation of the AF coefficients with BPSK input (magnitude of complex
coefficients) [GAM+14].
Figure 4.14(a) illustrates the mitigation performance achieved with a two-tone blocker input.
The tone frequencies are the same as in simulations and have been chosen within the grid
of the 1024-point FFT. The generator power was 39 dBm. The centre frequency of the
receiver is 200 MHz, the BB bandwidth being 25 MHz. By using two taps for the AFs, the
average suppression of non-linear distortion components is 25.4 dB in Figure 4.14(a). The
additional taps have been introduced, as the real receiver suffers from memory effects that
are excluded in the simulations. The memory depth of M = 1 found in Section 2.7.3, that
corresponds to two AF coefficients, has thereby been validated through measured data that
has been processed by the feedforward mitigation algorithm.
The obtained suppression at different input power levels is illustrated in Figure 4.15.
Compared to simulations, RF distortion is milder in measurements which explains the relatively high suppression obtained by the BB-only model. Add to this, CD will occur long
before the RF distortion products become remarkable. This is due to the gain settings of
116
R&S SMU200A
Two-tone/BPSK at
58 . . . 38 dBm
USRP N210
10 MHz
Reference
Ethernet
Figure 4.13: Sketch of the measurement setup [GAM+14].
the WBX front-end that employs fixed gain at the RF and BB amplifier. Only the overall
gain can be controlled through a variable attenuator at the RF input (see Appendix B).
Unfortunately, the BB gain of 9 dB is much too high and cannot be easily changed to provoke more RF distortion. However, the cascaded model provides still the best mitigation
performance.
Similar performance has been achieved with the BPSK-modulated signal, as shown in Figure 4.14(b). Here, the centre frequency and the BB bandwidth of the USRP were chosen
to 570 MHz and 25 MHz, respectively. The BPSK signal has been generated with the same
parameters as used in simulations, and the generator power and PAPR were 44 dBm and
3.35 dB, respectively. A mitigation gain of 7.1 dB is achieved using two taps for each AF.
To sum up, the co-existence of RF and BB distortions has been verified through real-world
measurements, demonstrating the effectiveness of the total cascaded model. The suppression of the different distortion components is significantly better with the joint mitigation
of the RF and BB stage non-linearities, compared to the previous solutions presented in the
literature, which employ a model for only either of the stages. Moreover, joint mitigation
of non-linear distortions and corresponding mirror components due to I/Q imbalance has
been demonstrated by measurements. Thus, a complete model has been found capturing
all essential distortion in the RF receiver front-end. Consequently, the digital feedforward
mitigation method provides a high-performance linearisation solution for complete wideband
DCR chains, enabling flexible sensing and processing of the RF spectrum in radio communication and radar devices.
117
0
10
20
30
40
50
60
70
80
90
100
0
10
20
30
40
50
60
70
80
90
100
TT Input
Before Mitigation
After Mitigation
Mirror-Frequency
RF+BB Distortions
BB Distortions
10
5
0
5
10
Baseband Frequency (MHz)
(a) Two-tone scenario with 39 dBm input power.
BPSK Input
Before Mitigation
After Mitigation
Mirror-Frequency
RF+BB Distortions
BB Distortions
10
5
0
10
5
Baseband Frequency (MHz)
(b) BPSK scenario with 44 dBm input power.
118
35
30
RF-only
BB-only
Cascaded
Ideal
25
20
15
10
5
0
50
48
46
44
42
Input Power (dBm)
40
38
Figure 4.15: Average suppression of non-linear distortion components for different mitigation
models obtained with measured data [GAM+14].
Model Mismatch significantly affects the achievable mitigation performance. First, only
distortions created by the reference model can be mitigated by the AF. That is, the core
distortion terms should match the physical structure of the RF front-end as close as possible
to address all possible distortion. This has been shown by the joint modelling of RF and BB
distortion generated in typical DCR front-ends. Otherwise, poor mitigation performance is
achieved by the RF-only and BB-only models aiming for mitigating cascaded non-linearity
in DCR front-ends. In such a case, adding more taps to the AF cannot compensate for severe
model mismatch, since only the provided reference signal content is filtered.
Bandsplit Filters are adopted to derive the desired and reference signal for the AF stage
and are therefore very important for the mitigation performance. Due to the high dynamic
range conditions with weak signals and strong blockers, the filters should provide a high
stopband attenuation. Thus, high filter orders and a significant amount of DSP resources may
be required to implement them. However, achieving a good selectivity in the digital domain
is still much easier compared to analogue filtering. For instance, their analogue counterparts
suffer from component tolerances, design size and cost challenges, and thermal effects such
as temperature drifts. Hence, the challenge of FIR filter is rather an implementation issue
than a fundamental limit of the algorithm.
In-Band Distortion is a severe problem for the purely digital implementation of the feedforward mitigation. It solely processes the blocker signals and subtracts them from the
received desired signal. As the original transmitted blocker x(t) is not known a priori at
119
A/D Interface is a significant bottleneck of the whole digital feedforward mitigation algorithm as it should provide a digitised version of the total BB signal including the strong
distortion-producing blockers. If the distortion stems from a blocker that is outside the digitisation bandwidth, no reference signal is available for distortion regeneration. Add to this,
there is the dynamic range problem when digitising a BB signal comprising several weak
and strong carriers. In brief, there is a huge burden on the A/D interface of the receiver
front-end concerning the ADC resolution and bandwidth. These requirements also depend
on the selectivity employed at the RF input, e.g. by means of a preselection bandpass, and
the actual target system specifications.
To overcome that problem, a large frequency bandwidth should by digitised as a whole by a
single ADC or piecewise by parallel ADCs, each digitising a subset of the total bandwidth.
However, the first approach is quite unrealistic with todays ADC technologies, especially
due to the high power consumption [VSHGA+06]. However, a single wideband and high
resolution ADC will likely become feasible in future, especially due to the fast growing
digital circuit technology. In [KH08b; ZMS09], mixed-signal/hybrid techniques have been
120
Clipping Distortion (CD) cannot be mitigated by the presented algorithm due to the
different nature of the distortion process. The feedforward algorithm at hand can only mitigate mild non-linear distortion where the distortion-producing blocker can be still recovered.
Clipping causes severe distortion falling into the entire BB. Handling CD would require
a non-clipped input signal, as discussed in Section 3.2. Such algorithms typically require
hardware modifications of the RF front-end, e.g. a second RF path, and are out of scope in
this thesis. Therefore, many practical RF measurements employ modulated signals with a
reduced PAPR to strictly avoid CDs.
Cross-modulation effects are also neglected throughout the thesis and considered to be
low, due to their dependence on the relative strength of the underlying signals [PC03;
VSHGA+06]. The presented feedforward algorithm focuses on mitigation of the dominant
IMD products.
121
3B1
3B2
B1
B2
IMD
f
B1 + B2
Figure 4.16: Minimum frequency separation for multiple blockers.
122
123
125
5.1 Methodology
A typical scenario of interest is depicted in Figure 5.1, where an MS receives two adjacent
FDMA channels belonging to different BTSs, a desired signal to be demodulated and a
blocker signal. It is likely that there are conditions where the blocker is received with higher
BTS1:
Desired Channel
MS
BTS1
Non-linear
Behaviour
BTS2:
Blocker Channel
BTS2
Figure 5.1: Typical fading scenario with two adjacent FDMA channels from different BTSs
[Dup13].
power than the desired one, e.g. due to relative distances or unequal channel fading conditions caused by movement of the MS. Then, the blocker easily causes non-linear distortion
that may fall on top of the adjacent weak desired signal, as sketched in Figure 5.1.
Such a scenario practically appears in GSM for railways (GSM-R) at the transition band between the public GSM extended band (GSM-E) and the GSM-R band at GSM 900 downlink
frequencies. Details are given in Section 7.2.2. Following that practical use case, a signal
configuration with a weak desired GSM carrier and a strong adjacent BPSK blocker has
been assumed for the simulations with the parameters summarised in Table 5.1. The exact
geometrical layout of the scenario under consideration is sketched in Figure 5.2. Assuming
126
5.1 Methodology
Table 5.1: Detailed characteristics of the simulated signals [Dup13].
Parameter
Desired
Blocker
Modulation
GSM
BPSK
Symbol rate
256 kbps
2 Mbps
Bandwidth
200 kHz
2.7 MHz
0.35
Carrier frequency
0 Hz
1.55 MHz
PAPR
0 dB
5 dB
SNR
15 dB
67 dB
Roll-off factor
BTS Desired
20
MS
20
0m
20
0m
00
BTS Blocker
127
LOS/NLOS
NLOS
Speed
(km/h)
20
60
Characteristic
Long delays, high
frequency-selectivity
20
D1: Rural macro-cell
NLOS
60
Frequency-flat
120
20
D2a: Rural moving networks
LOS
60
120
Large Doppler
variability,
frequency-selective
300
distinguished by their line of sight (LOS) or non-line of sight (NLOS) characteristic, i.e. if
there is dominant multipath propagation or not. Scenario C3 causes high time variation
and is assumed to stress the algorithm due to rapid changing regrowth from snapshot to
snapshot. Scenario D1 possess a low selectivity in frequency and low time variation and is
likely to work without trouble. It constitutes a counterpart to the other scenarios. Large
Doppler variability and high frequency-selectivity is caused in scenario D2a for representing
moving networks, that should stress the convergence time of the AF stages significantly.
The DCR front-end is modelled by a static memoryless polynomial for modelling RF nonlinearity that is assumed to be dominating. Memory effects are not considered in this
simulation, hence, single-tap AFs are sufficient. First, the impact of the channel on the
spectral regrowth of the blocker is studied. Then, the convergence characteristics of the
AF stage is investigated under varying blocker power conditions from snapshot to snapshot.
Finally, the performance of the algorithm is verified and reasons for failures are given.
128
Power
where different delayed versions of the received signals superimpose. In addition, there is a
frequency-dependent behaviour of the channel effects. Hence, multiple types of fading are
distinguished, that are sketched in Figure 5.3. Large-scale fading denotes the path loss due
Path loss
Path loss +
Shadowing
Path loss +
Shadowing +
Fast fading
Distance
Figure 5.3: Qualitative behaviour of different fading phenomena [Dup13].
to the relative distance and shadowing of large objects like buildings. The MS moves through
a large distance in relation to the BTS. Small-scale fading comprises fast variations on the
amplitude of the received signal, mainly due to constructive and destructive superposition
of multipath components. Here, the MS moves in small distances. Furthermore, frequencyflat and frequency-selective fading is distinguished, depending on the number of resolvable
delays. In that context, the coherence bandwidth denotes the width of frequencies of the
signal that are similarly affected by the channel. Finally, also Doppler spread occurs due to
the movement of the MS. Depending on the speed, the Doppler spread causes slow or fast
fading. In particular, in fast fading, the coherence time of the channel is smaller than the
symbol period and causes a broadening of the original signal in time domain.
Due to these fading conditions, the non-linear distortion will vary from snapshot to snapshot
in a non-linear manner. Also, signals from different BTSs experience different channel effects
and sum up in the receiver. Thereby, highly unbalanced signal configurations with weak and
strong signals may occur, especially in high frequency-selective channels, where signals can
be even temporarily cancelled. Finally, the algorithm has to track the changes in these signals
introduced by the channel characteristics, which requires a certain convergence time of the
129
GSM
Channel 1
BPSK
Channel 2
Tx signal
WINNER
AGSM
KAGC
+
ABPSK
SNR
Adjustment
BERlinear
GSMlinear
LP
BERnon-linear
GSMnon-linear
LP
BERNONLIM
GSMNONLIM
LP
Interferer
Adjustment
AGC
+
a1 , a3
Demodulator
a
1 , a
3
NONLIM
Digital domain
AWGN
Noise
Artificial Ref
Model
Analogue domain
130
AWGN source that jointly mimic the non-linear DCR in the simulator. Before demodulation,
the signal runs through a lowpass (LP) filter. The burst-wise BER analysis of the desired
GSM carrier is conducted with the GSMSim simulation framework [EM97], that is also used
and detailed in Section 7.2.2. In brief, it is an easy to use implementation of a transmitter and
receiver front-end of a standard compatible GSM system. In total, 200 channel realisations
are simulated, with 100 GSM frames per realisation.
131
20
PSD (dBm/Hz)
30
Linear
Non-linear
40
50
SIR
60
Spectral Regrowth
80
GSM Channel
70
90
BPSK Blocker
100
110
10
20
PSD (dBm/Hz)
30
4 2
0
2
4
Baseband Frequency (MHz)
(a) Snapshot n.
10
10
Linear
Non-linear
40
50
60
70
80
90
100
110
10
4 2
0
4
2
Baseband Frequency (MHz)
(b) Snapshot n + 1.
132
Basically,
0.12
0.1
C3
D1
D2a
0.08
0.06
0.04
0.02
0
60
40
20
0
SIR (dB)
20
40
60
70
Figure 5.7: SIR enhancement analysis for the scenario C3 at 60 km/h [Dup13].
20
SNR = 15 dB
15
10
5
0
5
10
15
20
25
30
30 25 20 15 10 5
0
5
SINR Before Mitigation (dB)
10
15
20
Figure 5.8: SINR enhancement analysis for the scenario C3 at 60 km/h [Dup13].
133
ENONLIM Elinear
,
Enon-linear Elinear
(5.1)
where E denotes the amount of errors per burst in the corresponding cases indicated by the
subscripts. Note that there is a certain minimum error Elinear due to the noise and fading,
the mitigation algorithm is not supposed to mitigate. A BEMP value near 1 indicates the
best performance, whereas BEMP 1 denotes a bad performance. From Figure 5.9 it
can be concluded that in 90 % of all simulated snapshots, the BEMP is higher than 90 %,
134
BEMP
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
C3 w/o AGC
D1 w/o AGC
D2a w/o AGC
C3 w/ AGC
D1 w/ AGC
D2a w/ AGC
0
10
20
30
40
50
60
% Realisations
70
80
90
100
BER
101
102
103
104
25
C3 Before Mitigation
D1 Before Mitigation
D2a Before Mitigation
C3 After Mitigation
D1 After Mitigation
D2a After Mitigation
20
15
10
5
0
SINR (dB)
10
15
135
100
Gain w/ AGC
BER
101
102
103
104
25
C3
C3
C3
C3
20
Before w/ AGC
Before w/o AGC
After w/ AGC
After w/o AGC
15
10
5
0
SINR (dB)
10
15
Figure 5.11: BER vs. SINR for scenario C3 with and without AGC [Dup13].
is enabled, the mitigation performance is reduced significantly. Although the AGC provides
approx. 10 dB of SINR gain, the BER is higher compared to the case without AGC. This is
due to the attenuation of the desired signal, which is affected significantly by noise.
To sum up, the radio channel causes a certain shaping of the blocker signal according to the
characteristics of the scenario. In the statistical analysis of the behaviour of the NONLIM
algorithm under random channels, it has been shown that there is not a significant performance degradation among the scenarios, although there is a dependence on the speed
[Dup13]. In brief, the algorithm is applicable in receivers that operate in a real-world radio environment. However, the best performance is achieved in scenario D1 due to the less
frequency-selective, low-variance interference. In addition, it has been found that the AGC
reduces the overall system performance, although it prevents IMD generation. By disabling
or relaxing the AGC under the presence of high-power signals/blockers, the dynamic range
can be improved with the help of the feedforward algorithm. Furthermore, the algorithm
should be bypassed under high SIR conditions.
The bypassing needs to be switched according to the interference power at hand. For this
purpose, the input power can be gathered from the desired branch to estimate the significance
of non-linear distortion. Another solution can be to perform a cross-correlation between the
desired and reference branch to determine the amount of non-linear distortion present. Then,
the algorithm can be enabled or disabled according to a threshold.
136
137
6 Real-time Implementation
In the prior chapters, the feedforward mitigation capabilities have been demonstrated based
upon offline post-processing of simulated and measured data in MATLAB. Practical aspects
of embedding the DSP-based algorithm into the devices digital back-end are rarely discussed
in the state of the art. Although the complexity of the algorithm has been analysed on a
high level in Section 4.3, it is desirable to build an FPGA prototype of the purely digital
feedforward mitigation to obtain further insights into practical challenges. An FPGA is well
suited for this application due to its rapid prototyping.
Embedding the algorithm into the device offers tremendous advantages. The receiver selfregulates the induced non-linear distortion and thereby improves its effective linearity. In
addition, the host PC is offloaded and can solely perform the specific BB processing since
the digital back-end transfers the corrected I/Q data directly to the host.
There is no implementation of the purely digital feedforward mitigation algorithm available
in the state of the art. The only prior implementation of the feedforward mitigation algorithm
is reported in [KH08b], where the distortion regeneration takes place at RF level. This kind
of mixed-signal implementation, that has been discussed in Section 3.2, requires a custom
hardware design with considerable effort. General implementation of an LMS AF on FPGAs
can be found in [MB04]. An optimisation of the LMS tap-weight update by simple bit-shift
operations is proposed in [OKA06].
In this chapter, a brief overview of a purely digital implementation on the FPGA of the
USRP N210 [Ett] is given. This work has been carried out within a master thesis [Sch13],
to which the interested reader is referred for more details. In addition, the results have been
published in [SGT13].
139
6 Real-time Implementation
holds programmable logic.
level description of the circuit is mapped to the FPGA architecture with the help of
hardware description languages (HDLs) (very high speed integrated circuit HDL and Verilog) and software tools for electronic design automation (EDA) [Sch13]. FPGAs are very
popular due to their flexibility and very high speed supporting parallelism of algorithms. The
digital circuit is implemented based on configurable logic blocks (CLBs), which comprise
look-up tables (LUTs), flip-flops (FFs), multiplexers (MUXs), and carry/arithmetic logic.
Beside this general FPGA fabric, the target architecture offers dedicated memory (Block
random-access memory (RAM)) and DSP48A slices that are well suited for DSP applications [Sch13]. A DSP48A slice is composed of a pre-adder, a signed 18 18 bit multiplier,
and a post-adder. These slices can implement multiply-accumulate (MAC) architectures
such as FIR filters, where a multiplication is followed by an addition.
The number representation is a challenge for implementing DSP-based algorithms on an
FPGA. A fixed-point or floating-point arithmetic with a certain bit width can be implemented. However, a fixed-point implementation is more common due to its increased efficiency. Nevertheless, the designer has to deal with bit growth, overflow, and scaling/
rounding methods. For example, if two numbers are added, the word length needs to be
increased by 1 bit in order to avoid potential overflow. Likewise, multiplying N and P wide
numbers result in a bit width of N + P for maintaining full precision. Overflows need to be
strictly avoided, as the number can wrap around from positive to negative or vice versa and
may cause abrupt jumps in the waveform. Consequently, the result of any arithmetic operation needs to be rounded and truncated. Beside other techniques, non-symmetric rounding
to positive is applied for this design, that adds a binary 1 to the rightmost bit position after
truncation and right-shifting by k bit positions (scaling by 2k ) [Sch13].
140
xQ (t)
xI (t)
ADC
ADC
xQ (n)
xI (n)
wBP (n)
bpr_filter
wBS (n)
bsd_filter
Target Spectrum
Strong Blockers
IMD products
141
uQ (n)
uI (n)
dQ (n)
dI (n)
refmodel
x
2 x
, x C
u3I + uI u2Q
u3Q + u2I uQ
d_delay
delay
wBS (n)
bsr_filter
rQ (n)
rI (n)
r_delay
delay
lms_filter
L=1
w0,Q
w0,I
eQ (n)
eI (n)
x
Q (n)
x
I (n)
Figure 6.1: Block diagram of the NONLIM FPGA implementation by means of a two-tone
example [Sch13].
6 Real-time Implementation
estimates is performed in the reference branch, that shows already sufficient mitigation in
practice [GSH+12a].
The architecture is composed of the FPGA module instances bandstop-desired filter
(bsd_filter ), bandpass-reference filter (bpr_filter ), bandstop-reference filter (bsr_filter ), reference model (refmodel), and the LMS AF (lms_filter). The band-split filter separates
the blocker and the useful signal to
2 and ,
3 whereas a complex implementation for the
bpr_filter is chosen due to the mirror-frequency interference being present in real-world measured signals (cp. Section 4.4). The reference model computes the RF non-linearity term
x2 x according to (2.22) and outputs a signal such as .
4 For separated I/Q processing, this
term is decomposed into (2.23) and (2.24). The exact coefficient 3a2 in (2.22) is omitted
without affecting the performance of the algorithm, as the AF stage will find the correct
value any way. Next, the distortion estimates are fed through a real-valued bandstop filter
(bsr_filter ) to suppress the blocker and to obtain only the distortion. An equivalent filter is employed in the desired branch, which has an inverse characteristic to the bpr_filter.
Then, the output signal
5 enters the AF stage that is depicted with a filter order M = 0
(L = M + 1 = 1). That is, only scaling of the estimates is conducted in the ideal case having
a perfect match of the reference non-linearity and the real-world non-linear behaviour of the
front-end. Here, a real-valued LMS implementation is chosen for reasons of simplification.
A complex-valued LMS implementation might outperform the real-valued one due to the
capability to mitigate AM/PM distortion and I/Q imbalance effects that are present in realworld signals. Alternatively, the AF length could be increased to compensate for the missing
cross-products between I and Q. Finally, as depicted in ,
6 the blocker may be added back
in order to satisfy a spectral sensing use case (Section 4.1).
There are certain processing delays introduced by NONLIM that need to be compensated by
delay blocks (d_delay and r_delay). There is a pure processing delay of the processing chain
as well as the settling time of the FIR filters (length of M/2). The signals of the desired
and reference branch need to be aligned to provide the AF with corresponding samples.
The delay block d_delay accounts for the relative delay between the desired and reference
branch. Another delay block r_delay compensates for the absolute delay of the reference
branch to synchronously add the blocker to the AF error signal.
142
CORDIC
CIC
Decimator
Small
Halfband
Decimator
Halfband
Decimator
fine downconversion
decimation
decimation
decimation
ADC
Delay
bsd_filter
bpr_filter
d_delay
u3I + uI u2Q
u3Q + u2I uQ
bsr_filter
refmodel
Custom NONLIM Module
Ethernet
Interface
VITA
Protocol
lms_filter
Figure 6.2: Existing DDC chain with the integrated NONLIM module [Sch13].
processing tasks such as decimation, filtering, and interpolation still remain on the FPGA.
The main task of the existing DDC chain is to perform frequency conversion to zero-IF
and decimation, such that the samples can get transferred to the PC. The ADC clock with
100 MHz is much too high to directly stream the data to a PC in real-time, i.e. a decimation
by at least 4 needs to be performed in order to transfer them via gigabit ethernet (GigE)
[Ett; Sch13].
The coordinate rotation digital computer (CORDIC) denotes an iterative algorithm performing approximated computations of trigonometric functions to form a NCO that conducts the final down-conversion. The cascaded integrator comb (CIC) is a hardware-efficient
implementation for decimation and interpolation filters by using only additions and subtractions. However, the CIC causes aliasing components and a roll-off in the passband that
makes subsequent filtering essential. In order to compensate for the CIC roll-off, a two-stage
halfband filter is employed with symmetric FIRs with every second coefficient being zero.
This allows for using the hardware multipliers in a time-multiplexed manner. In order to
efficiently compensate for the CIC roll-off, a decimation rate as a multiple of 4 should be
chosen [Sch13]. Only in the case this constraint is met, both halfband filters are activated.
To relax the requirements of the real-time processing of the samples in the custom NONLIM
module, a decimation rate of rdecim = 8 is used. Hence, the custom module is placed after
the decimation as indicated in Figure 6.2. This allows for a processing time of 8 clock cycles
until the next sample appears at the input. Also, BB distortion is likely to be filtered out if
143
6 Real-time Implementation
the blocker IF frequency is chosen to be slightly greater than fs /6 (cp. Section 4.2). Thus,
distortion in the fundamental zone are on focus in this implementation.
The HDL Verilog has been used for the implementation, as the existing USRP FPGA
firmware is already written in Verilog [Ett]. To verify the correct functionality of each submodule, a top-down design flow is adopted [Sch13]. Starting from a fixed-point high-level
simulation in MATLAB, an HDL-MATLAB co-simulation is performed by using a custom
file interface and the ISim behavioural simulator that is included in the Xilinx EDA tool
ISE. Finally, the modules are validated running on real hardware. The following subsections
provide further details of the implementation of the main sub-modules.
FIR Filter
There are three instances of FIR filters, namely bsd_filter, bpr_filter and bsr_filter, as
summarised in Table 6.1. These are designed with the given characteristics using the HDLTable 6.1: FIR filter implementation for a two-tone blocker centred at fIF = 3 MHz [Sch13].
Filter instance
BW
fcutoff1
fcutoff2
bsd_filter
bpr_filter
640 kHz
320 kHz
600 kHz
bsr_filter
Astop /Apass1/2
Filter order M
85/0.2 dB
161 (Mbsd )
40/0.2 dB
95 (Mbpr )
95 (Mbsr )
MATLAB interface and the Parks-McClellan algorithm (Section 4.2). The implementation
is established using the intellectual property core generator of the Xilinx EDA tool, that
efficiently map a pre-defined module with a specific function to the target device.
Basically, there are two main possible implementation structures: MAC (symmetric systolic
FIR) and distributed arithmetic (DA). The MAC structure uses multiplications and additions, as illustrated in Figure 6.3, that are mainly implemented by concatenated DSP48A
slices. This type of implementation is used for the bsd_filter and bsr_filter. On the contrary, the DA approach substitutes the multiplications by bit shifts, additions, subtractions,
and LUTs. It is used for the bpr_filter to save DSP48A slices at the expense of general
FPGA fabric (CLBs). A complex-valued implementation has been chosen for the bpr_filter.
Although resulting in twice as much resources, a non-symmetric filtering characteristic at
both positive and negative frequencies cannot be tolerated with focus to the mitigation performance. Basically, a very pure reference signal is desirable for the reference branch to
144
w0
18
0
DSP48A Slice
w1
w2
w3
y
DSP48A Slice
DSP48A Slice
DSP48A Slice
37
Reference Model
The block diagram for implementing the reference non-linearity, illustrated in Figure 6.4,
exactly follows (2.23) and (2.24), where the initial value 3a2 is omitted to save another multiplier. Basically, the implementation performs the multiplications and additions sequentially.
In order to keep the results within the given bit width, a non-symmetric rounding to positive
and a subsequent bit truncation of the least significant bits (LSBs) is established. In total,
the implementation of the reference model requires 6 DSP48A slices.
LMS Filter
Regarding the LMS filter, a real-valued implementation is chosen that is decomposed into
an FIR and coefficient update part, as depicted in Figure 6.5. The FIR is implemented by
L parallel multipliers and is followed by a hard truncation of SF bits. Here, no rounding
is performed as it is expected that the AF stage accounts for the imposed bias. A similar
145
6 Real-time Implementation
x
2I
x
I
16
round
and
truncate
32
x
3I + x
I x
2Q
x
3I
33
32
16
round
and
truncate 16
x
I x
2Q
32
x
Q
16
x
2Q
round
and
truncate
32
Q
2I x
x
3Q + x
x
3Q
33
32
16
round
and
truncate 16
x
2I x
Q
32
Real-valued
Complex-valued
In general
2L + 2L = 4L
4L + 2L = 6L
12
12
18
16
24
146
Truncate
Factor
18
MU
w
18
32
16
r(n L 1)
32
16
r(n j 1)
32
r(n)
16
j = 0, . . . , L 1
18
r(n L 1)
r(n j 1)
16
16
34
34
Coefficient Update
y(n)
r(n)
16
34
34 + L
1
Truncate
Factor
16
SF
16
16
d(n)
j = 0, . . . , L 1
FIR Filter
e(n)
Delay Blocks
There are two instances of delay blocks, d_delay in the desired branch and r_delay for
adding back the blocker to the final AF error signal. Both are implemented by block RAM
following the first in first out principle.
Design Report
The resource utilisation of each FPGA module is detailed in Table 6.3, though fabric for
interconnection of the modules is not considered here. Table 6.4 summarises the amount of
used resources with and without the custom NONLIM module. Although there is a large
amount of resources available, timing violations turn out to be the challenging problem in
practical FPGA implementations when approaching a high resource utilisation of the total
available resources. Fortunately, all timing constraints have been met with the aforementioned design.
Another figure of merit is the introduced processing delay of the NONLIM module, which is
of high interest in time division multiple access (TDMA)-based communication systems like
147
6 Real-time Implementation
Table 6.3: Resource utilisation of the individual sub-modules [Sch13].
Type\Module
bsd_filter bpr_filter
refmodel
bsr_filter
r/d_delay lms_filter
LUTs
1158
6796
160
697
562
FFs
1478
7294
352
883
878
DSP48A
22
13
16
Block RAM
1 (each)
Filter order
161
95
95
Architecture
MAC
DA
MAC
MAC
MAC
Table 6.4: Relative resource utilisation of stock and custom FPGA firmware [Sch13].
Type\Design
NONLIM
LUTs
31649/47744 (66 %)
9783 (20 %)
40578/47744 (85 %)
FFs
20007/47744 (41 %)
11446 (24 %)
31179/47744 (65 %)
DSP48A slices
31/126 (24 %)
57 (45 %)
88/126 (70 %)
Block RAM
41/126 (32 %)
2 (2 %)
43/126 (34 %)
GSM. The delay of the individual modules in FPGA clock cycles is detailed in Table 6.5.
The total delay accounts for the sum of all sub-modules in the reference branch plus the
Table 6.5: Delay of the invidual FPGA sub-modules [Sch13].
Module
Delay (cycles)
bsd_filter
33
bpr_filter
16
bsr_filter
24
lms_filter
refmodel
10
r_delay
49 8
16 8
d_delay
settling time of the FIR filters, delays by pipeline stages, and rounding operations. The
total delay amounts for 201 clock cycles, which corresponds to 2.01 s with a master clock
being fCLK = 100 MHz. Regarding this consideration, the convergence time of the AF is not
included, as it depends on the signal configuration and chosen step size at hand. Basically, the
processing delay of the FPGA prototype is likely to be negligible in modern communication
systems.
148
149
6 Real-time Implementation
Power
Combiner
TX
10 MHz phase-locked
REF
R&S SMHU
93.3 MHz at 11 dBm
WBX
RX
USRP N210
R&S SMY02
92.7 MHz at 11 dBm
fcentre = 90 MHz
150
PSD (dBm/Hz)
20
40
Distorted Signal
Cleansed Signal
TT Input
Mirror Frequency
60
IMD3
IMD3
LO Leakage
80
100
Undesired Notches
120
0
1
2
3
6 5 4 3 2 1
Baseband Frequency (MHz)
Figure 6.7: Two-tone mitigation performance with the custom FPGA firmware [Sch13].
Power
Combiner
TX
10 MHz phase-locked
REF
R&S SMIQ06B
122.3 MHz at 65 dBm
WBX
RX
USRP N210
R&S SMBV
123 MHz at 8 dBm
151
6 Real-time Implementation
PSD (dBm/Hz)
20
40
60
Distorted Signal
Cleansed Signal
BPSK Input
Single GSM Channel
Mirror Frequency
Spectral Regrowth
LO Leakage
80
100
120
6 5 4 3 2 1
0
1
2
3
Baseband Frequency (MHz)
Figure 6.9: BPSK mitigation performance with the custom FPGA firmware [Sch13].
device measurements with two-tone and BPSK blocker signals. The mitigation performance
may be improved further by employing the extended cascaded model with a complex-valued
LMS implementation, as it has been proposed in Chapter 4.
152
7 Application Scenarios
The main scope of this chapter is to present some use cases of the digital feedforward mitigation algorithm. Spectrum sensing in CR, GSM downlink reception, and GSM-based passive
radar are discussed as examples. The results have been published in [GSH+12c; GSH+12b;
GSH+12a; GSH+13].
153
7 Application Scenarios
Radio Environment
Observe
Act
Learn
Orient/Plan
Decide
154
155
7 Application Scenarios
Energy-based Detection
Here, the main focus is on energy-based detection because it is the most common approach
for detecting unknown signals in CR applications especially due to its ease of implementation
[Urk67; DAS03; MGC10]. A major drawback of an energy detector (ED) is its large sensing
time when operating in low SNR conditions. Also, an ED is not able to sense weak signals
that are covered by noise, however, they have to detect SNRs as low as 20 to 30 dB
[Raz09].
The ED, illustrated in Figure 7.2, measures the energy of the input signal over a specific time
interval T and compares it with a threshold [MGC10; GKM+11a; GKM+11b; Urk67]. The
||2
ADC
W
1
T
H0,1
(7.1)
can be deduced, where N = T W is the total number of samples acquired in the sensing
time T and 02 is the noise power of the detector. There are closed-form expressions for the
distribution of both hypotheses depending on the type of modelling for the input signal. The
probability of detection PD and the probability of false alarm PF A are the most common
performance figures for an ED and can be expressed by
PF A = P (V > | H0 ) and
PD = P (V > | H1 ).
156
T like in a spectrum analyser [Ars07]. For long sensing duration T , the aforementioned
Gaussian distribution of the noise is valid, and hence the (7.1) in both hypotheses can be
approximated as Gaussian [Sha10]:
N ( , 2 ) H
0
0
0
V
N ( , 2 ) H
1
1
1
with 0 = 2N, 02 = 4N, 1 = 2N(1 + SNR) and 12 = 4N(1 + 2SNR). In this case, PD
and PF A can be calculated with
PF A
1
( 0 )
( 1 )
1
= erfc
and PD = erfc
,
2
2
0 2
1 2
(7.2)
where erfc() denotes the complementary error function. In fact, assuming Gaussian random
processes provides closed-form expressions for computing the threshold for a given performance (PF A , PD ).
157
7 Application Scenarios
The main objectives for considering non-linear distortion in the operation of a CR are
Reliable spectrum sensing under huge dynamic range conditions and
Proper demodulation of weak desired signals for communication.
Signal constellations with weak user and strong blocker signals are on focus in the following
discussion. However, from the CR perspective, strong interferers can be PU signals and the
weak user signals might be associated with secondary users (SUs).
First, IMD products can show up as unwanted signals in free frequency bands, where the
CR may operate as SU. As a consequence, simple energy-based spectrum sensing would
detect this band as occupied and the radio would miss its transmit opportunity [GKM+11a].
Figure 7.3 depicts the distorted BB spectrum ye(t) of Figure 2.33 with 1000 averages and the
thresholds in 1024 sub-bands for energy detection. For threshold calculation, a noise-only
measurement and a false alarm probability PF A = 0.01 have been used. The sub-bands
are filtered from the input signal by a 1024-point FFT. With respect to the lower IMD
region in Figure 7.3, signal present was detected in all realisations (PD = 1). These are
actually the false alarms due to interference induced by the non-linear wideband receiver,
decreasing the spectrum sensing reliability and causing the loss of opportunity for secondary
PSD (dBm/Hz)
communication.
10
20
30
40
50
60
70
80
90
100
110
Distorted Signal
(PF A = 0.01)
Lower IMD Products
False alarm
due to interference
479
481
483
487
489
491
485
Baseband Frequency (MHz)
493
495
Second, IMD- and XMD-products may coincide with a desired SU signal, causing an increase
of the BER and hence difficulties during demodulation.
To alleviate these effects, either interferers themselves have to be cancelled or their distortion
products need to be reduced. The interferer itself can only be fully compensated if it is sub-
158
159
PSD (dBm/Hz)
PSD (dBm/Hz)
7 Application Scenarios
20
30
40
50
60
70
80
90
100
110
120
8
20
30
40
50
60
70
80
90
100
110
120
4
Distorted Signal
Cleaned Signal
NONLIM Filter Range
4.2
2
0
2
4
Baseband Frequency (MHz)
(a) Entire baseband.
4.4
4.6 4.8
5
5.2 5.4
Baseband Frequency (MHz)
(b) Fundamental zone enlarged.
5.6
5.8
each other, they are jointly denoted by spectral regrowth in the remaining discussion. The
suppression of the spectral regrowth in the fundamental zone is on average 23 dB, as seen in
Figure 7.4(b), indicating the possibility to cleanse the BB of regrowth for reliable spectrum
sensing. The mitigation has been performed with a simple BB non-linearity model manifesting 2nd , 3rd , and 5th -order distortion (Section 2.5). The operating range of the mitigation
algorithm is depicted by the orange-coloured surface in Figure 7.4(a). For the AF stages,
different step sizes have been used: 2 = 20, 3 = 30, and 5 = 10 (subscript n in n
denoting the order of non-linearity). The chosen step sizes and the filter order are relatively
large because the distortion products had very low amplitudes in general. A substantially
long AF length of 128 was necessary to mitigate the distortions, attributed to the simplified
I/Q-based processing and the model mismatch.
160
PSD (dBm/Hz)
mented mitigation algorithm on a specific bandwidth of interest (260 kHz) in the fundamental zone. Figure 7.5 depicts the original and cleaned baseband spectrum, the band
10
20
30
40
50
60
70
80
90
100
110
Oiginal Signal
Cleaned Signal
(PF A = 0.01)
Band of Interest
479
481
483
485
489
491
487
Baseband Frequency (MHz)
493
495
Figure 7.5: Original and cleaned baseband spectrum with energy detection thresholds.
of interest, as well as its ED threshold for PF A = 0.01. Figure 7.6 illustrates the
receiver operating characteristic (ROC) for both cases, showing the detection of interfer-
ence [GKM+11a]. Note that the ROC is typically presented for the desired detections. In
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
Original Signal
Cleaned Signal
Noise-only Characteristic
0
0.1
0.9
ing that there is no more interference signal present in that band. In fact, the mitigation
161
7 Application Scenarios
aims for avoiding any detection in the band of interest, as only non-linear distortions appear
there. After mitigation, the effect of the non-linearly induced interference has been fully
compensated, thus improving the reliability of spectrum sensing. In some cases PD is even
below PF A , attributed to the long AFs that suppressed all reference signal content being
present in the desired signal. Figure 7.4(a) clearly shows that the algorithm in the used
implementation only works locally compared to the wideband impact of the distortions.
data bits. Regarding the access to the network, the GSM implements a TDMA scheme,
3
57
Data bits block I
26
Training sequence
57
162
Hyper frame
0
2047
Super frame, 6120 ms
0 1
50
Multi-frame, 120 ms
0 1
25
0 1 2 3
5 6 7
TS0
FCCH
SCH
BCCH
BCCH
BCCH
BCCH
CCCH
CCCH
CCCH
CCCH
TS1
DB
DB
DB
DB
DB
DB
DB
DB
DB
DB
TS2
DB
DB
DB
DB
DB
DB
DB
DB
DB
DB
TS3
DB
DB
DB
DB
DB
DB
DB
DB
DB
DB
163
TS4
DB
DB
DB
DB
DB
DB
DB
DB
DB
DB
TS5
DB
DB
DB
DB
DB
DB
DB
DB
DB
DB
TS6
DB
DB
DB
DB
DB
DB
DB
DB
DB
DB
TS7
DB
DB
DB
DB
DB
DB
DB
DB
DB
DB
7 Application Scenarios
each consisting of 8 TSs or bursts, are illustrated. TS 0 is always used for control information, e.g. the frequency correction channel (FCCH), or the synchronization channel (SCH).
The remaining seven TSs are reserved for TCHs, but are usually not used. In the idle state,
DBs are transmitted, which have a predefined bit sequence.
For more details on the GSM system, the interested reader is referred to [EVB+09] and
references therein.
164
Serving
BTS
Interferer
MS
165
PSD (dBm/Hz)
7 Application Scenarios
20
30
40
50
60
70
80
90
100
110
120
4
2.4
3.2
Figure 7.10: Complex baseband spectrum with a weak channel and two strong neighbouring
GSM channels, creating IMD on top of the weak channel.
Neighbour Interference
GSM
-R
921
925
GSM 900
GSM-E
935
960
f in MHz
Figure 7.11: Radio spectrum frequency allocation for GSM 900 downlink in Europe.
SIR was set 0 dB, resulting in a BER for the desired channel of 0.38 (103 600 total bits) that
makes the signal already unusable.
The scenario illustrated in Figure 7.10, for example, practically appears in the GSM-R
[KBN+06; BFM+10]. GSM-R is based on the common GSM standard and uses reserved
frequencies for railway applications, e.g. 876-880 MHz in uplink, and 921-925 MHz in downlink in Europe [Etsd]. The frequency allocation for GSM 900 downlink band in Europe is
illustrated in Figure 7.11, where interference in the downlink from public GSM-E band to the
GSM-R band is of major concern. The problem became more serious since the refarming of
the GSM 900 band, since operators are allowed to employ UMTS or LTE systems in GSM-E
band. The consequences of this close frequency allocation for the MS in downlink are less
considered by regulators or network planners. Although operators keep themselves within
their assigned frequency ranges and power levels, it is likely that non-linear distortions in
the MS can easily cause harmful interference. A detailed description of GSM-R sensitivity
to external wireless interference is given in [BFM+10].
166
x(t)
digital
analogue/digital
Non-linear
Receiver
y(n)
Feedforward
Mitigation
Processing
y(n)
GSM
Demodulator
{
s}
BER
Figure 7.12: Basic system architecture, treating with non-linear distortions in a GSM
receiver.
signal x(t) is amplified, down-converted, and digitised by a non-linear receiver to y(n). It
does not only contain an amplified baseband version of x(t), but also distortion products
added by the receiver. In the very simple case, the non-linear behaviour of the receiver can be
modelled by a memoryless polynomial, as discussed in Section 2.5. IMD products generated
by mixing of the desired and the interference signal are particularly annoying [Ken00]. The
mitigation DSP block tries to eliminate these distortions, outputting the signal y(n). The
signal is then further processed by the GSM demodulator including synchronisation and
channel equalisation. Finally, the BER can be computed with the received bits {
s}, if the
transmitted bits are known.
Referring to Chapter 4, a feedforward mitigation algorithm has been applied to GSM signal
in order to handle third-order distortions of the LNA at RF, falling on top of the desired
signal. Figure 7.13 illustrates the main architecture, where the basic idea is to isolate the
C
interferers and to regenerate the distortions they cause. A lowpass/bandpass (hR
LP /hBP ) pair
splits the input signal into a reference signal yref , containing the interferer only, and the
desired signal ydes , including the desired signal and the distortions caused by the interferer.
The reference signal is then fed into a reference non-linear model, in this case a simple memoryless polynomial. The term x2 x denotes the baseband representation of the third-order
distortions induced by the real-valued RF passband signal at the RF amplifier (Section 2.5).
The distortion products are then further processed by an AF to adjust their magnitudes
and phases to exact values [Hay02]. The common error signal e(n) is used for adapting the
167
7 Application Scenarios
hR
LP
ydes
hC
BP
y(n)
Adaptive Filter
yref
hR
LP
x2 x
y3
FIR
e(n) = y(n)
f
Reference
Non-linearity
Adaptation
Algorithm
f
Figure 7.13: Block scheme of the implemented mitigation algorithm for GSM.
FIR filter taps and represents the main output of the mitigation processing. Finally, the
reference distortions are subtracted from the desired signal, hence reducing the non-linear
distortions falling onto the desired signal. Both I and Q components of the complex BB
signal are processed separately for reasons of simplification.
Due to the sample-by-sample operation of the adaptive filtering and the constant-envelope
modulation, the TDMA structure does not affect the convergence behaviour of the AF. Instead, the characteristics of the lowpass/bandpass pair as well as the quality of the reference
signal yref dictate the mitigation performance. Table 7.2 summarizes the used filter parameters for a best case estimation. The filter order depends on the dynamic range between
Table 7.2: Filter parameters for the considered GSM interference scenario.
Parameter
Passband hR
LP (real)
Passband hC
BP (complex)
Value
0.25 MHz . . . +0.25 MHz
2.6 MHz . . . 0.8 MHz
Transition bandwidth f
50 kHz
Stopband attenuation
80 dB
FIR order
1200
interfering and desired channel at hand. In this example, it is chosen sufficiently high to
obtain high stopband attenuation, and thus pure desired and reference signals. In general,
sufficient knowledge about the interferer signal is required, such as its modulation and fre-
168
ADC
Speech
encoder
Channel encoder
interleaver
MUX
RF
Tx
GMSK
modulator
Transmitter
GSM communication system. Random bits are generated and passed through the channel
DAC
Speech
decoder
Channel decoder
deinterleaver
DeMUX
GMSK
demodulator
RF
Rx
Receiver
Mobile
Channel
169
7 Application Scenarios
bit stream is modulated with GMSK, performing differential encoding of the incoming burst
with a non-return to zero sequence.
The detailed block diagram of the GSM receiver is illustrated in Figure 7.15. It represents
yb(n)
Matched filter
MLSE
Demux
Channel decoder/
de-interleaver
{b
s}
Channel estimator/
synchronization
Figure 7.15: Block diagram of the receiver implementation used in GSMsim [EM97].
not a complete front-end as, e.g., filtering of the desired channel has to be applied manually.
The demodulator estimates the most probable received symbol sequence with the help of the
training sequence. First, channel estimation, synchronisation, and matched filtering of the
received GSM bursts are performed. The delay and the channel coefficients are determined
by cross-correlating the known training sequence with the actual received one. The sequences
provided by the matched filter, containing one sample for each transmitted symbol, are then
further processed by the minimum least square error (MLSE) detector. The MLSE detector
is implemented as a Viterbi equalizer which provides an estimate of the most probable
sequence of transmitted binary symbols. Finally, the estimated bits are extracted by demultiplexing, de-interleaving, and channel decoding.
Simulation Setup
In order to evaluate the performance of the mitigation algorithm, a complete GSM link
including receiver non-linearity has been simulated. The non-linear receiver is represented by
a third-order polynomial and an AWGN source, whereas the radio channel is not considered
herein. The signal configuration as sketched in Figure 7.10 has been simulated with different
SIRs for the desired channel, taking into account fixed SNR of 15 dB (constant signal and
noise power for the desired channel). In total, 700 DBs (103 600 bits) have been analysed.
The adaptive filtering was performed using conventional time domain LMS filtering with
a single tap, that has been found to provide sufficient convergence speed and low residual
error.
170
GSM interferers
919.7 MHz@
0.6 . . . 8.4 dBm
PC
f
ETH
R&S
CMU200
WBX
USRP
N210
Results
The BER performance before and after mitigation (BM/AM), as well as the ideal BER level
without interference (linear receiver), are shown in Figure 7.17 for simulated and measured
data. Basically, the BER is saturating at around 0.007 (RXQUAL = 2), which is the lower
bound dictated by the fixed SNR of the desired channel. The simulated BER performance
after mitigation is approaching to the ideal BER level, indicating that almost all IMD on
top of the desired signal has been mitigated. The BER has been reduced significantly to less
than 0.03 (RXQUAL = 4) for all SIR conditions. That is, the GSM receiver provides a better
detection of the transmitted symbols after applying the mitigation processing. However, the
mitigation gain for the measured data is a bit less in low SIR conditions, mainly due to the
inaccurate distortion regeneration. In contrast to simulations, an AF of order 6 has been
171
7 Application Scenarios
BER
101
102
103
BM-Sim
BM-Meas
0
AM-Sim
AM-Meas
5
SIR (dB)
7
6
5
4
3
2
1
0
RXQUAL
100
15
Figure 7.17: BER performance vs. SIR for the desired channel before (BM) and after mitigation (AM).
used for processing the measurement data. Thus, inaccuracies are compensated, that have
not been considered in the reference model, such as memory effects and I/Q imbalance.
It has been shown that non-linear distortions can be the predominant interference phenomena, causing serious problems in scenarios with strong neighbouring channels. Due to the
presence of non-linear distortions in almost every receiver, this algorithm can be applied
in many scenarios. The effectiveness of this approach has been demonstrated here on real
communication signals.
In general, the performance is limited by the basic assumptions for DSP-based mitigation
processing [GSH+12a]. Assuming high input signal power, the receiver amplifier and mixing
stages might be overloaded or even clipping might occur in the ADC. In such conditions, the
generated distortions are almost irreparable. Moreover, detecting and isolating the interferer
might need an additional RF path, making the receiver architecture more complex. In
addition, the effect of the radio channel on the mitigation processing need to be looked at
closely.
172
x(t)
xref (t)
xtar (t)
BTS
Figure 7.18: Sketch of the passive radar system.
BTS and the reflections from the target are obtained. Finally, the target is located by
computing the cross-correlation of both signals, yielding the so called range-doppler map.
The performance of such a system depends critically on the used waveform, which is not
under the control of the radar designer. A limiting factor in using GSM as an illumination
waveform is given by the low bandwidth which results in a fairly low range resolution (i.
e. the ability of separating two targets in range). To overcome this inconvenience, fusion
of multiple bistatic configurations (several illuminators) is required. That is, simultaneous
reception of all potential illuminations (BTSs) is necessary.
A multi-channel receiver system with an uniform linear antenna array is used to extract the
direct path signal (reference path) and target echos (surveillance path), by taking advantage
of spatial and time filtering methods. The challenge in passive radar is to detect the weak
target echos in continuous presence of the strong direct path signal. Any possible small
distortion or neighbouring channel cross-talk will not only affect the extraction of the direct
signal, but also mask the weak target echos. The performance of clutter suppression and
weak target detection depends, therefore, critically on a clean desired channel.
Next, a simulation is conducted to demonstrate that weak target echos are masked due
to clutter induced by non-linearly induced interference. The signal scenario of interest is
illustrated in Figure 7.19. It depicts the 8192-point FFT spectrum (with Hann window)
averaged over 100 bursts, for the ideal and distorted signal, respectively. Two strong GSM
carriers are constantly present at 0.8 MHz and 1.6 MHz, causing third-order IMD around
DC and 2.4 MHz. In the DC zone, there is a target echo 70 dB below the blocker, having
a Doppler shift fd = 0.2 kHz and a time shift tshift = 40 ms (360 samples). Thus, it is a
delayed version (reflection) of the desired GSM carrier. In addition, there is a clutter signal
being 60 dB below blocker level with fd = 1.7 103 kHz and tshift = 4 ms. The desired
173
PSD (dBm/Hz)
7 Application Scenarios
40
50
60
70
80
90
100
110
120
130
Strong Blockers
IMD3
Ideal signal
Distorted signal
IMD3
Clutter and Target Echo
Desired Signal
2
1
0
1
2
Baseband Frequency (MHz)
Figure 7.19: BB spectrum of a GSM-based passive radar scenario with a weak desired carrier
and two strong blockers.
signal is masked by IMD due to RF non-linearity with a third-order coefficient of 12 that
corresponds to an IIP3 = 17.4 dBm following (2.14). After filtering the desired channel by
a 200 kHz lowpass, the target is located in range and Doppler by assuming an ideal direct
(reference) signal.
The diagrams in Figure 7.20(a) and Figure 7.20(b) illustrate Doppler-cuts of the RangeDoppler map before and after applying the feedforward mitigation algorithm. In Figure 7.20(a), the weak target echo at fd = 0.2 kHz is covered by an increased noise floor
due to the RF distortion. The target cannot be distinguished from the nearby clutter due
to the receiver non-linearity. After applying the algorithm, all interference on top of the
desired channel has been mitigated, thereby making that weak target echo visible again.
More information on GSM-based passive radar for medium range surveillance can be found
in [ZNW09; ZDB+12] and references therein.
174
(dB)
(dB)
0
5
10
15
20
25
30
35
40
45
50
1.5
0
5
10
15
20
25
30
35
40
45
50
1.5
0.5
0
0.5
Doppler (kHz)
(a) Before mitigation
1.5
0.5
0.5
0
Doppler (kHz)
(b) After mitigation
1.5
175
8 Conclusions
8.1 Methodology and Main Results of the Thesis
This thesis provides a closed representation of receiver non-linearities, BB modelling, digital
mitigation, and practical aspects including implementation issues. Non-linear distortions,
being a subset of RF impairments, may cause a significant degradation in performance of
sensing, communication, and radar.
IMD in signal configurations of weak and strong signals are of major concern, especially in
coexistence scenarios of heterogeneous wireless systems. Circuit non-linearity is even more
crucial in wideband receivers with limited selectivity, such as those used in SDRs. Simple
behavioural modelling by means of memoryless polynomials, found by system identification techniques, has been shown to be sufficient for the application of distortion mitigation.
Thereby, the behavioural model should match the target receiver topology as close as possible.
A purely digital feedforward mitigation algorithm, among other Dirty RF techniques, has
been followed to enhance the RF performance of the receiver, especially due to its easy
integration and efficient mitigation capabilities at system level. It has been shown through
extensive simulations and real-world RF measurements that a considerable mitigation of
non-linearly induced interference in low-cost RF front-ends can be achieved by applying
that algorithm. As a result, a significant increase of the effective linearity of the RF frontend can be obtained. Beside suppression of the newly generated frequency components,
the BER of modulated distorted signals has been reduced substantially. RF measurements,
including device characterisation and mitigation verification, have been carried out with a
typical wideband SDR, the USRP [Ett].
Moreover, it has been found through extensive simulations that the algorithm is able to
cope with dynamic radio channel conditions, manifesting severe small-scale and frequencyselective fading. Finally, a first FPGA prototype of the purely digital algorithm has been
successfully implemented on the SDR platform USRP, thereby demonstrating the real-time
operation of the algorithm on an SDR.
177
8 Conclusions
In conclusion, the thesis demonstrates the algorithms potential of mitigating RF and/or
BB distortion created by typical DCR architectures. System-level DSP-based algorithms to
handle Dirty RF effects represent a promising alternative to conventional analogue design
optimisation. A benefit of the digital solution is its versatile range of applications due to
its independence to the actual waveform of the desired input, as only the strong blocker
signal is processed. The proposed solution is a cost efficient technique that can be easily
implemented in hardware, right in between the digitiser and the BB-specific processing.
Finally, the pure digital implementation totally meets the concept of SDR. Even more, the
mitigation algorithm is generally applicable for wideband DCRs and is not restricted to SDR
adopted in the majority of the presented use cases.
178
179
List of Abbreviations
A/D . . . . . . . analogue/digital
ACPR
. . . . . . . baseband
BCCH
BP . . . . . . . . bandpass
BPSK . . . . . . binary phase shift keying
BTS . . . . . . . base transceiver station
CD
. . . . . . . clipping distortion
181
List of Abbreviations
CIR . . . . . . . channel impulse response
CLB . . . . . . . configurable logic block
CORDIC . . . . coordinate rotation digital computer
CPLD . . . . . . complex programmable logic device
CR
. . . . . . . cognitive radio
CW . . . . . . . continuous wave
DA
. . . . . . . distributed arithmetic
DAC
. . . . . . digital-to-analogue converter
DB
. . . . . . . dummy burst
DC
. . . . . . . direct current
DCR
. . . . . . direct-conversion receiver
. . . . . . differential non-linearity
DPD
. . . . . . digital predistortion
. . . . . . . energy detector
EDA
182
List of Abbreviations
FPGA
I . . . . . . . . . in-phase component
I/Q . . . . . . . in-phase/quadrature
IF . . . . . . . . intermediate frequency
IIP2 . . . . . . . input-referred second-order intercept point
IIP3 . . . . . . . input-referred third-order intercept point
IMD . . . . . . . intermodulation distortion
INL . . . . . . . integral non-linearity
IRR . . . . . . . image rejection ratio
LMS . . . . . . . least-mean square
LNA
. . . . . . low-noise amplifier
LO . . . . . . . . local oscillator
LOS . . . . . . . line of sight
LP . . . . . . . . lowpass
LS . . . . . . . . least squares
LSB . . . . . . . least significant bit
183
List of Abbreviations
LTE . . . . . . . Long Term Evolution
LTI . . . . . . . linear time invariant
LUT . . . . . . . look-up table
M-IMR . . . . . multi-tone intermodulation ratio
MAC . . . . . . multiply-accumulate
MATLAB . . . MATrix LABoratory
MIMO . . . . . multiple input multiple output
ML . . . . . . . maximum likelihood
MLSE . . . . . . minimum least square error
MS
. . . . . . . mobile station
MSE
. . . . . . mean-square error
MUX . . . . . . multiplexer
NB
. . . . . . . normal burst
184
List of Abbreviations
PDF . . . . . . . probability density function
PPS . . . . . . . pulse per second
PSD . . . . . . . power spectral density
PU
Q
. . . . . . . primary user
. . . . . . . . quadrature component
ROC
RSSI
. . . . . . traffic channel
185
List of Abbreviations
TDMA . . . . . time division multiple access
TDNN . . . . . time-delay neural network
TS . . . . . . . . time slot
TT
. . . . . . . two-tone
WL . . . . . . . widely-linear
WL-RC . . . . . reduced-complexity widely-linear
XMD . . . . . . cross-modulation distortion
186
List of Symbols
x . . . . . . . . . column vector
X . . . . . . . . matrix
[X]1 . . . . . . matrix inversion
(.)
. . . . . . . complex conjugate
(.)T
. . . . . . . transpose
yBB
(t) . . . . . . BB signal including RF and/or BB distortion
187
List of Symbols
yRF
(t) . . . . . . RF signal including LNA distortion
188
List of Figures
2.1 Block scheme of a typical dual-IF heterodyne receiver.
. . . . . . . . . . . .
9
9
10
12
13
14
16
18
21
22
26
29
31
32
34
35
36
38
38
40
43
45
47
49
50
51
54
56
57
189
List of Figures
2.31 IIP2 and IIP3 measured with USRP2+WBX [Ett]. . . . . . . . . . . . . . .
57
58
60
60
61
62
63
63
66
67
68
70
73
74
74
77
78
80
3.11 BB spectrum of the received signal before and after blocker cancellation. . .
81
3.12 Wideband SDR front-end with antenna array for spatial filtering [CB05]. . .
82
83
87
89
4.4 Power levels of distortion estimates Terms 1-6 of Table 4.1 [GAM+14]. . . .
92
94
96
190
List of Figures
4.16 Minimum frequency separation for multiple blockers. . . . . . . . . . . . . . 122
5.1 Typical fading scenario with two adjacent FDMA channels. . . . . . . . . . . 126
5.2 Geometrical layout of the fading scenario [Dup13]. . . . . . . . . . . . . . . . 127
5.3 Qualitative behaviour of different fading phenomena [Dup13].
5.4 Block diagram of the fading simulation setup [Dup13].
. . . . . . . . 129
. . . . . . . . . . . . 130
. . . . . . . 141
6.2 Existing DDC chain with the integrated NONLIM module [Sch13]. . . . . . . 143
6.3 Block diagram of a symmetric systolic FIR implementation [Sch13]. . . . . . 145
6.4 Block diagram of the pipelined implementation of refmodel [Sch13]. . . . . . 146
6.5 Implementation structure of the LMS filter [Sch13]. . . . . . . . . . . . . . . 147
6.6 Experimental setup of the two-tone scenario. . . . . . . . . . . . . . . . . . . 150
6.7 Two-tone mitigation performance with the custom FPGA firmware [Sch13]. . 151
6.8 Experimental setup of the BPSK scenario. . . . . . . . . . . . . . . . . . . . 151
6.9 BPSK mitigation performance with the custom FPGA firmware [Sch13]. . . 152
7.1 CR cognition cycle [Hay05; PKM+11]. . . . . . . . . . . . . . . . . . . . . . 154
7.2 Block diagram of a discrete energy detector. . . . . . . . . . . . . . . . . . . 156
7.3 Averaged BB spectrum and energy detection thresholds [GSH+12a]. . . . . . 158
7.4 Mitigation performance with measured multi-carrier signals. . . . . . . . . . 160
7.5 Original and cleaned baseband spectrum with energy detection thresholds. . 161
7.6 ROC curves before and after mitigation. . . . . . . . . . . . . . . . . . . . . 161
7.7 GSM NB structure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
7.8 GSM frame structure.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
. . . . . . . . . . . . . . . . . . . . . . . . 165
7.10 Baseband spectrum with a weak and 2 strong GSM channels . . . . . . . . . 166
7.11 Radio spectrum frequency allocation for GSM 900 downlink in Europe. . . . 166
7.12 Basis system architecture for GSM scenario
. . . . . . . . . . . . . . . . . . 167
7.13 Block scheme of the implemented mitigation algorithm for GSM. . . . . . . . 168
7.14 Block diagram of the GSMSim framework [EM97]. . . . . . . . . . . . . . . . 169
191
List of Figures
7.15 Block diagram of the receiver implementation used in GSMsim [EM97]. . . . 170
7.16 Laboratory setup reproducing the considered interference scenario. . . . . . . 171
7.17 BER performance vs. SIR for the desired channel. . . . . . . . . . . . . . . . 172
7.18 Sketch of the passive radar system. . . . . . . . . . . . . . . . . . . . . . . . 173
7.19 BB spectrum of a GSM-based passive radar scenario. . . . . . . . . . . . . . 174
7.20 Doppler-cuts of the 3D-shaped Range-Doppler maps. . . . . . . . . . . . . . 175
B.1 Block scheme of the complete USRP SDR platform. . . . . . . . . . . . . . . 214
B.2 USRP2 motherboard, Rev. 1.0 (2007), cp. [Ett] . . . . . . . . . . . . . . . . 215
B.3 Wi-Fi transceiver board RFX2400 [Ett] . . . . . . . . . . . . . . . . . . . . . 217
B.4 Wideband transceiver board WBX [Ett] . . . . . . . . . . . . . . . . . . . . 218
C.1 Flowgraph of the MATLAB simulator NONLIM. . . . . . . . . . . . . . . . . 219
C.2 Software framework of the USRP MATLAB interface. . . . . . . . . . . . . . 221
192
List of Tables
2.1 Frequency components generated by RF non-linearity. . . . . . . . . . . . . .
33
36
39
42
56
90
193
List of Publications
[DGS+13]
[GAM+14]
Michael Grimm, Markus Alln, Jaakko Marttila, Mikko Valkama, and Reiner
Thom. Joint mitigation of nonlinear RF and baseband distortions in wideband direct-conversion receivers. In: IEEE Transactions on Microwave Theory and Techniques 62.1 (Jan. 2014), pp. 166182. issn: 0018-9480. doi:
10.1109/TMTT.2013.2292603.
[GKM+11a]
[GKM+11b]
[GSH+12a]
Michael Grimm, Rajesh Kumar Sharma, Matthias Hein, and Reiner Thom.
DSP-based mitigation of RF front-end non-linearity in cognitive wideband
receivers. In: FREQUENZ Journal of RF-Engineering and Telecommunications, Special Issue WSR2012 66.9-10 (Sept. 2012), pp. 303310. doi:
http://dx.doi.org/10.1515/freq-2012-0052.
195
List of Publications
[GSH+13]
[GSH+12b]
Michael Grimm, Rajesh Kumar Sharma, Matthias Hein, and Reiner Thom.
Mitigation of non-linearly induced interference in cognitive wideband receivers. In: Proc. 7th Karlsruhe Workshop on Software Radios. Karlsruhe,
Germany, Mar. 2012, pp. 119123.
[GSH+12c]
Michael Grimm, Rajesh Kumar Sharma, Matthias Hein, and Reiner Thom.
Non-linearly induced interference and its mitigation in cognitive wideband receivers. In: Proc. of 18th European Wireless Conference. Poznan, Poland, Apr. 2012, pp. 16. url: http://ieeexplore.ieee.org/xpl/
articleDetails.jsp?arnumber=6216854.
[KGM+11]
[MKG+11]
[SGT13]
Florian Schlembach, Michael Grimm, and Reiner Thom. Real-time implementation of a DSP-based algorithm on USRP for mitigating non-linear
distortions in the receiver RF front-end. In: Proc. 10th International Symposium on Wireless Communication Systems (ISWCS2013). Ilmenau, Germany, Aug. 2013, pp. 110114. url: http://ieeexplore.ieee.org/xpl/
articleDetails.jsp?arnumber=6629706.
196
Bibliography
[ALA09]
[AMV10a]
[AMV+13]
[ALM+12]
Markus Alln, Toni Levanen, Jaakko Marttila, and Mikko Valkama. Iterative Signal Processing for Mitigation of Analog-to-Digital Converter Clipping
Distortion in Multiband OFDMA Receivers. In: Hindawi Journal of Electrical and Computer Engineering 2012, Article ID 532560 (2012), p. 16. doi:
10.1155/2012/532560.
[AMV10b]
Markus Alln, Jaakko Marttila, and Mikko Valkama. Modeling and mitigation of nonlinear distortion in wideband A/D converters for cognitive radio
receivers. In: International Journal of Microwave and Wireless Technologies
2.02 (2010), pp. 183192. doi: 10.1017/S1759078710000292.
[Anr00]
Anritsu. Intermodulation distortion measurements using the 37300 series vector network analyzer. In: Application Note 11410-00257 (Sept.
2000), pp. 111. url: http://www.anritsu.com/en-US/Downloads/
Application-Notes/Application-Note/DWL3.aspx.
197
Bibliography
[Anr12]
[AVR08]
[Ant11]
[Ars07]
Hseyin Arslan, ed. Cognitive radio, software defined radio, and adaptive
wireless systems. Dordrecht: Springer, 2007. url: http://www.gbv.de/dms/
ilmenau/toc/51782308X.PDF.
[BFM+10]
Gianmarco Baldini, Igor Nai Fovino, Marcelo Masera, Marco Luise, Vincenzo
Pellegrini, Enzo Bagagli, Giuseppe Rubino, Raffaele Malangone, Marcoccio
Stefano, and Fabio Senesi. An early warning system for detecting GSM-R
wireless interference in the high-speed railway infrastructure. In: International Journal of Critical Infrastructure Protection 3.3-4 (2010), pp. 140
156. issn: 1874-5482. doi: 10.1016/j.ijcip.2010.10.003.
[BR06]
P. Balister and J. Reed. USRP hardware and software description. Tech. rep.
Virginia Polytechnic Institute & State University, June 2006.
[Etsa]
[BESJ+05]
[BB99]
[BBC88]
E. Biglieri, S. Barberis, and M. Catena. Analysis and compensation of nonlinearities in digital transmission systems. In: IEEE Journal on Selected
Areas in Communications 6.1 (Jan. 1988), pp. 4251. issn: 0733-8716. doi:
10.1109/49.192728.
198
Bibliography
[BCB+]
Eric Blossom, Johnathan Corgan, Martin Braun, Matt Ettus, and Tom Rondeau. The GNU Software Radio. GNU project. url: http://gnuradio.org/
redmine/projects/gnuradio/wiki.
[BCG+10]
[CB05]
D. Cabric and R.W. Brodersen. Physical layer design issues unique to cognitive radio systems. In: Proc. IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Vol. 2. Sept.
2005, 759763 Vol. 2. doi: 10.1109/PIMRC.2005.1651545.
[CGG+10]
[Che11]
[CGH+11]
Zhe Chen, Nan Guo, Zhen Hu, and R.C. Qiu. Channel state prediction in cognitive radio, part I: Response delays in practical hardware
platforms. In: Proc. of IEEE Southeastcon. Mar. 2011, pp. 45 49. doi:
10.1109/SECON.2011.5752903.
[Chi11]
[DS07]
C. Dehos and T. C. W. Schenk. Digital compensation of amplifier nonlinearities in the receiver of a wireless System. In: Proc. 14th IEEE Symposium
on Communications and Vehicular Technology in the Benelux. Nov. 2007,
pp. 16. doi: 10.1109/SCVT.2007.4436243.
[DGM+06]
Rahul Dhar, Gesly George, Amit Malani, and Peter Steenkiste. Supporting integrated MAC and PHY software development for the USRP SDR.
In: Proc. IEEE Workshop on Networking Technologies for Software Defined
Radio Networks. Sept. 2006, pp. 6877. doi: 10.1109/SDR.2006.4286328.
199
Bibliography
[DAS03]
F.F. Digham, M.-S. Alouini, and M.K. Simon. On the energy detection of
unknown signals over fading channels. In: Proc. IEEE International Conference on Communications (ICC). Vol. 5. May 2003, pp. 35753579. doi:
10.1109/ICC.2003.1204119.
[Etsb]
[Etsc]
[Etsd]
[DSA09]
[DF11]
[DF12]
J. Dohl and G. Fettweis. Evaluation of estimation and mitigation algorithms for nonlinearly distorted OFDM signals on a SDR platform.
In: Proc. IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). 2012, pp. 535539. doi:
10.1109/SPAWC.2012.6292966.
[DKF10]
Jan Dohl, Stefan Krone, and Gerhard Fettweis. On the impact of non-linear
amplifiers in single-carrier systems: an analytical approach. In: Proc. IEEE
Vehicular Technology Conference (VTC). 2010.
[Dup13]
200
Bibliography
[Dup12]
[EVB+09]
Jrg Eberspcher, Hans-Joerg Vgel, Christian Bettstetter, and Christian Hartmann. GSM : architecture, protocols and services. 3rd. Chichester: Wiley, 2009, IX, 326 S. url: http://www.gbv.de/dms/ilmenau/toc/
520372328.PDF.
[EM97]
[Ett09]
Matt Ettus. Software Radio, GNU Radio, and the USRP Product Family Open Hardware for Software Radio. Mar. 2009.
[FB11]
B. Fehri and S. Boumaiza. Systematic estimation of memory effects parameters in power amplifiers behavioral models. In: Proc. IEEE MTTS International Microwave Symposium Digest (MTT). 2011, pp. 14. doi:
10.1109/MWSYM.2011.5972927.
[Fet09]
Bruce Alan Fette, ed. Cognitive radio technology. Amsterdam: Elsevier, Acad. Press, 2009. url: http://www.gbv.de/dms/ilmenau/toc/
594461537.PDF.
[FLP+05]
[gha11]
A. Shahed hagh ghadam. Contributions to analysis and DSP-based mitigation of nonlinear distortion in radio transceivers. PhD thesis. Tampere,
Finland: Dept. Commun. Eng., Tampere University of Technology, 2011.
doi: http://urn.fi/URN:ISBN:978-952-15-2794-4.
[GCB08]
[Ham08]
Firas Abbas Hamza. The USRP under 1.5X Magnifying Lens. June
2008. url: http://gnuradio.org/redmine/attachments/129/USRP_
Documentation.pdf.
201
Bibliography
[Hay02]
[Hay05]
[HB08]
Franois Horlin and Andr Bourdoux. Digital compensation for analog frontends : a new approach to wireless transceiver design. Chichester: Wiley, 2008,
VIII, 255 S. url: http://www.gbv.de/dms/ilmenau/toc/562160094.PDF.
[HS11]
[Kar01]
James L. Karki. Designing for low distortion with high-speed op amps. In:
Texas Instruments Analog Applicat. J. (July 2001), pp. 2533. url: http://
www.ti.com/lit/an/slyt133/slyt133.pdf.
[KBN+06]
[KH08a]
E. A. Keehr and A. Hajimiri. Digitally-assisted linearization of wideband direct conversion receivers. In: Proc. European Microwave Integrated Circuit Conference (EuMIC). Oct. 2008, pp. 159162. doi:
10.1109/EMICC.2008.4772253.
[KH09a]
[KH08b]
[KH09b]
Edward A. Keehr and Ali Hajimiri. Digitally assisted equalization of thirdorder intermodulation products in wideband direct conversion receivers. In:
International Journal of Microwave and Wireless Technologies 1.Special Issue 04 (2009), pp. 377385. doi: 10.1017/S1759078709990341.
202
Bibliography
[Ken00]
[KAV14]
[KAV13]
[KK01]
[Law10]
[LW10]
[Lef10]
[LHG+10]
M. Li, L. Hoover, K.G. Gard, and M.B. Steer. Behavioural modelling and
impact analysis of physical impairments in quadrature modulators. In: IET
Microwaves, Antennas & Propagation 4.12 (2010), pp. 21442154. issn:
1751-8725. doi: 10.1049/iet-map.2009.0278.
[MKH+10]
203
Bibliography
[MGC10]
[Mar09]
[MRS91]
[MB04]
Uwe Meyer-Bse. Digital signal processing with field programmable gate arrays. Berlin: Springer, 2004. url: http://zbmath.org/?q=an:1050.94005.
[Mit95]
J. Mitola. The software radio architecture. In: IEEE Communications Magazine 33.5 (1995), pp. 2638. issn: 0163-6804. doi: 10.1109/35.393001.
[MM99]
J. Mitola and G.Q. Maguire. Cognitive radio: making software radios more
personal. In: IEEE Personal Communications 6.4 (Aug. 1999), pp. 1318.
issn: 1070-9916. doi: 10.1109/98.788210.
[MMK+06]
D. R. Morgan, Zhengxiang Ma, Jaehyeong Kim, M. G. Zierdt, and J. Pastalan. A generalized memory polynomial model for digital predistortion of RF
power amplifiers. In: IEEE Transactions on Signal Processing 54.10 (Oct.
2006), pp. 38523860. issn: 1053-587X. doi: 10.1109/TSP.2006.879264.
[NNS10]
[OKA06]
[OAKS+10]
204
Bibliography
[Xila]
Partial Reconfiguration User Guide. Xilinx, Inc. Apr. 2013. url: http://
www.xilinx.com/support/documentation/sw_manuals/xilinx14_5/
ug702.pdf.
[PC03]
[Pin01]
[PKM+11]
[QCP+08]
[Etse]
[Raz09]
[Raz10]
[Raz97]
[RGV+13]
205
Bibliography
[Rou09]
[Sch08]
[Sch94]
[Sch13]
[Sch09]
Dominique Schreurs, ed. RF power amplifier behavioral modeling. Cambridge Univ. Press, 2009. url: http://www.gbv.de/dms/ilmenau/toc/
54883024X.PDF.
[Sha]
[Sha10]
[Spt]
[Sim]
SimRF - Design and simulate RF systems. The MathWorks, Inc. 2013. url:
http://www.mathworks.de/products/simrf/.
[Xilb]
Spartan-3A DSP FPGA Family Data Sheet. Xilinx, Inc. Oct. 2010. url:
http://www.xilinx.com/support/documentation/data_sheets/ds610.
pdf.
[Str09]
[Teh09]
206
Bibliography
[TGT+96]
[Ett]
Universal Software Radio Peripheral. Ettus Research, A National Instruments Company. url: http://www.ettus.com/.
[Urk67]
[VSHGA+06] M. Valkama, A. Shahed Hagh Ghadam, L. Anttila, and M. Renfors. Advanced digital signal processing techniques for compensation of nonlinear
distortion in wideband multicarrier radio receivers. In: IEEE Transactions
on Microwave Theory and Techniques 54.6 (June 2006), pp. 2356 2366.
issn: 0018-9480. doi: 10.1109/TMTT.2006.875274.
[VSH10]
M. Valkama, A. Springer, and G. Hueber. Digital signal processing for reducing the effects of RF imperfections in radio devices - An overview. In:
Proc. of IEEE International Symposium on Circuits and Systems (ISCAS).
2010, pp. 813816. doi: 10.1109/ISCAS.2010.5537444.
[VRW+05]
[VR03]
[Vye10]
David Vye, ed. X-Parameters - Fundamentally Changing Nonlinear Microwave Design. Vol. 53. No. 3. Microwave Journal, Mar. 2010, pp. 2244.
url: http://cp.literature.agilent.com/litweb/pdf/5990-5594EN.
pdf.
[WGC11]
Jianfeng Wang, M. Ghosh, and K. Challapali. Emerging cognitive radio applications: a survey. In: IEEE Communications Magazine 49.3 (Mar. 2011),
pp. 74 81. issn: 0163-6804. doi: 10.1109/MCOM.2011.5723803.
207
Bibliography
[Wbx]
[WM10]
[Wen09]
Song Wenmiao. Configure Cognitive Radio using GNU Radio and USRP.
In: 3rd IEEE International Symposium on Microwave, Antenna, Propagation
and EMC Technologies for Wireless Communications. Oct. 2009, pp. 1123
1126. doi: 10.1109/MAPE.2009.5355934.
[WSW+10]
[WLR+06]
J. Wood, M. LeFevre, D. Runton, J.-C. Nanan, B.H. Noori, and P.H. Aaen.
Envelope-domain time series (ET) behavioral model of a Doherty RF
power amplifier for system design. In: IEEE Transactions on Microwave
Theory and Techniques 54.8 (2006), pp. 31633172. issn: 0018-9480. doi:
10.1109/TMTT.2006.879134.
[YMC+08]
Zhi Yan, Zhangchao Ma, Hanwen Cao, Gang Li, and Wenbo Wang.
Spectrum sensing, access and coexistence testbed for cognitive radio
using USRP. In: Proc. 4th IEEE International Conference on Circuits
and Systems for Communications (ICCSC). May 2008, pp. 270274. doi:
10.1109/ICCSC.2008.63.
[ZDB+12]
R. Zemmari, M. Daun, G. Battistello, and U. Nickel. Target estimation improvement of GSM passive coherent location system. In: Proc. International
conference on radar systems Radar2012. Oct. 2012.
[ZNW09]
R. Zemmari, U. Nickel, and W.-D. Wirth. GSM passive radar for medium
range surveillance. In: Proc. European Radar Conference (EuRAD). Oct.
2009, pp. 4952.
[ZMB12]
208
Bibliography
[ZWC10]
Hanxin Zhou, Guojin Wan, and Limin Chen. A nonlinear memory power
amplifier behavior modeling and identification based on memory polynomial model in soft-defined shortwave transmitter. In: Proc. 6th International
Conference on Wireless Communications Networking and Mobile Computing
(WiCOM). Sept. 2010, pp. 14. doi: 10.1109/WICOM.2010.5600848.
[ZMS09]
Q. Zou, M. Mikhemar, and A. H. Sayed. Digital compensation of crossmodulation distortion in software-defined radios. In: IEEE Journal of Selected Topics in Signal Processing 3 (June 2009), pp. 348361. issn: 19324553. doi: 10.1109/JSTSP.2009.2020266.
[Zuc13]
Giorgia Zucchelli. Design and Verify RF Transceivers for Wireless Communication Systems. SimRF Webinar. The MathWorks, Inc. July 2013. url:
https://www.mathworks.de/company/events/webinars/wbnr77705.
html.
209
A Mathematical Derivations
A.1 Complex Memoryless Polynomial
The common polynomial equation (2.7) stemming from a Taylor series expansion holds only
for real-valued input x(t) and suits particularly well for modelling RF distortion. However,
a notation with complex input x(t) can be derived out of it.
Starting from (2.7)
y(t) =
N
X
n=1
N
X
n=1
N
X
cn
1
x(t)ej2fc t + x (t)ej2fc t
2
1
j2fc t
j2fc t n
x(t)e
+
x
(t)e
2n
n
x (t) + x(t)ej22fc t
|
{z
}
n=1
Pn
n
(t)]nk xk (t)ej22kfc t
[x
)
(
k=0 k
N
n
X 1 X n
xk (t) [x (t)]nk ej2(2kn)fc t ,
=
cn n
2 k=0 k
n=1
cn
(A.1)
1 j2nfc t
e
2n
(A.2)
by using the binomial identity. Next, an important assumption is made to simplify (A.2).
It is assumed that y(t) passes a zonal filter within the receiver line-up, thus, all frequency
components other than those centred at fc will be removed [MMK+06; BB99; KK01; Teh09].
Hence, only terms with 2kn = 1 k = (n1)/2 remain and only odd n will provide non-
zero output. Therefore, the binomial terms in (A.2) reduce to two and yield the simplified
211
A Mathematical Derivations
output
N
X
1
y(t) =
cn n 2
2
n=1
N
X
n+1
n n+1
2
2 (t) [x (t)]
n+1 x
1 1
=
cn n 1
2 2
n=1
=
N
X
n=1
cn n1
2
n=1 |
{z
N
X
cn
n1
2 x1 (t)
n+1 [x(t)x (t)]
{z
}
|
2
n
n+1
2
|x(t)|2
x(t) |x(t)|n1
cn x(t) |x(t)|n1 .
212
(A.3)
213
Host
REF
CLK
ETH
HR
HBF
LR
HBF
CIC
HR
HBF
LR
HBF
CIC
I
Q
Mux/
Demux
CIC
LR
HBF
HR
HBF
CLK
PLL
CIC
LR
HBF
HR
HBF
JTAG
Debug
MIMO exp
ADC
Daughter
Board
RAM
PPS
ADC
DAC
DAC
Serial
214
Debug Port
SD Card Slot
DAC
MIMO
Expansion Port
Gigabit
Ethernet Port
ADC
DC Power
215
input
and
output
channels
(auxiliary
ADCs
and
DACs)
for
received signal strength indicator (RSSI) level measurement, temperature, bias levels
[Ham08],
I/O control interface for daughter boards (e.g. selection of RF port, synthesizer lock
detection [Ham08]),
Debug interface for common logic analyzers,
High-speed serial interface, and a
JTAG interface for reprogramming the CPLD or FPGA debugging purposes using the
Xilinx ChipScope tool.
The TRx boards have independent LOs/RF synthesizers for the Tx and Rx path
216
217
218
C Source Code
C.1 NONLIM Algorithm
The NONLIM simulator is an object-oriented implementation of the DSP-based digital feedforward mitigation algorithm in MATLAB. It comprises a group of objects, in the following
referred to as blocks, that are connected with each other to form a flowgraph that realises
the feedforward mitigation processing. This flowgraph is illustrated in Figure C.1 and is
similar to a MATLAB Simulink or GNURadio environment [BCB+]. The main idea for this
Source.m
RefModel.m
BandSplit.m
AFilt.m
NonLIM.m
Block.m
User Requests
MATLAB
Workspace
Application
Figure C.1: Flowgraph of the MATLAB simulator NONLIM.
unitised structure is to represent the block diagram Figure 4.1 and to assign all block-related
properties and methods in an own object. All blocks are connected with their input and
219
C Source Code
output matrices and a few control signals. Thereby, all individual settings of each block can
be easily accessed and controlled in the MATLAB workspace by invoking the related handles.
Another great advantage of NONLIM is that it can be easily extended by new methods. That
was a great benefit during the development and research, especially for investigations with
the different reference models and AF variants including parameter variations. Finally, the
algorithm can be applied to very different kind of data, either synthetic simulated samples
or samples from real-world RF measurements.
Next, the functionality of each block is briefly described.
NonLIM.m is the top class that instantiates other blocks and connects them into the
flowgraph. It holds some methods for plotting and calculation of figure of merits, such as
the mitigation gain.
BandSplit.m does the detection of the spectral location of the strong blocker signal and
splits the input into a desired and a reference signal.
RefModel.m computes the distortion estimates by using a specific reference signal and
performs the subsequent filtering to provide only the added distortion products in the band
of interest to the AF, without the actual blocker signal.
AFilt.m holds the AF and adjusts the distortion estimates in amplitude and phase to those
in the desired signal. It is the actual core of the algorithm and allows for choosing different
implementations, such as LMS, NLMS, and recursive least square [Hay02].
Block.m is a parent class for all blocks and holds very general properties, such as the FFT
size and axis limits for plotting. All other blocks are derived from this (inheritance).
220
MATLAB
class USRP
UHD API
arg-interface
USRP
folder <timestamp>_<name>
.XML capabilities
.DAT data_output
.XML measurement
.DAT time_output
221
Theses
1. Modern communication systems impose tough requirements on the transceivers electronics that reach far beyond the state-of-the-art technology.
2. The analogue stages of a radios RF front-end are inherently imperfect. Achieving a
sufficient linearity, among other RF impairments, is a challenging issue in the practical
receiver design.
3. Circuit non-linearity is even more crucial in wideband receivers with limited selectivity,
such as those used as software defined radios (SDRs).
4. Coexisting heterogeneous wireless systems lead to scenarios with weak desired and
strong unwanted (blocking) signals. These blocking signals can easily enter front-end
amplification and mixing stages.
5. Receiver non-linearity generates additional frequency components that may fall
into free frequency bands or hit weak desired signals.
Thereby, odd-order
intermodulation distortions is of major concern.
6. Receiver non-linearity can be handled by design optimisation, cancelling distortionproducing signals, or by pre- or post-correction (mitigation) techniques.
7. System-level Dirty RF signal processing in the digital domain is a popular alternative
to alleviate non-linear distortions in the receiver.
8. Mitigating non-linear distortions at the receiver is more challenging than at the transmitter, especially due to the presence of multiple unknown signals with different power
levels and dynamics due to the radio channel.
9. A digital feedforward mitigation algorithm is employed that splits the received signal
in a desired and a reference signal, re-generates the distortion products, and adaptively
subtracts them from the desired signal.
10. Feedforward mitigation decreases the bit error rate (BER) of distorted signals, and
minimizes the energy of non-linearly induced interference. Finally, the effective linearity of the front-end and the dynamic range is increased.
223
224