Академический Документы
Профессиональный Документы
Культура Документы
Speaker:
Outline
OFDM System Description Synchronization
What is Synchronization?
Symbol Synchronization
Non-data-aided Method (Maximum likelihood, BPSK-OFDM case)
Frequency Synchronization
Non-data-aided Method (Via oversampling) Data-aided Method (Special training-symbol-block)
P/S
channel
Yi
P/S FFT
' S/P i
3
CCU Wireless Access Tech. Lab.
Symbol interval
xi,0,xi,1,,xi,N-1
CP
copy
x i xi , 0 , xi ,1 ,
, xi ,( N 1)
4
CCU Wireless Access Tech. Lab.
Signal Model
W
kn N
1 j N nk = e k = 0 ,1,2 , N
,N-1
0 WN ( N 1) 1 WN( N 1) ( N 1)( N 1) WN N N
X i ,k
1 = N
x
n =0
N 1
i ,n
2 nk N
1 xi ,n = N
X
k =0
N 1
i ,k e
2 nk N
- - > X i = Wx i . X i is frequency domain signal. FFT - - > x i = W * X i . x i is time domain signal. IFFT
Frequency Synchronization
Non-data-aided Method (Via oversampling) Data-aided Method (Special training-symbol-block)
What is Synchronization?
Symbol synchronization
Symbol Synchronization refers to the task of finding the precise moment of when individual OFDM symbols start and end.
Frequency synchronization
Let the transmitted signal be sn, then the complex baseband model of the passband signal yn is Then the received complex baseband signal rn is
rn = sn e j2ftx nTs e -j2frx nTs = sn e j2f nTs where f and f is the transmitter and receiver carrier frequency tx rx respectively, and f is frequency offset.
7
yn = sn e j2 ftx nT s
Received Signal
Transmitted signal
Cyclic prefix interval Symbol interval
xi ,( N CP ) ,
, xi ,( N 1) , xi , 0 , xi ,1 ,
, xi ,( N 1)
Received signal
xi' ,k = xi ,k e
j + j 2 n N
+ wi ,k
is frequency offset,
xi ,k represents kth sample in ith OFDM symbol, wi ,k is AWGN term.
8
CCU Wireless Access Tech. Lab.
9
CCU Wireless Access Tech. Lab.
( ( WN N 1)( N 1) WN N 1)0
xi ,( N a ) 0 WN ( N a 1) 1( N a 1) WN x i ,0 ( WN N 1)( N a 1) x i ,( N a 1)
=P
( N a )
X i ,0 ( N a) Xi =P X i ,( N 1)
10
CCU Wireless Access Tech. Lab.
11
CCU Wireless Access Tech. Lab.
12
Synchronization task
Data-aided method Non-data-aided method
13
CCU Wireless Access Tech. Lab.
Frequency Synchronization
Non-data-aided Method (Via oversampling) Data-aided Method (Special training-symbol-block)
+ w(k )
s (k + N CP ) ,0 k CP 1 , where st (k ) = , CP k CP + N 1 s (k CP ) CP is the length of cyclic prefix, N is the number of subcarriers, s (k ) is transmitted signal,
Observation interval
Symbol i-1
Symbol i
Symbol i+1
'
2N+CP
16
CCU Wireless Access Tech. Lab.
17
( m) =
r (k )r * (k + N ),
1 m + L 1 2 2 ( m) = r ( k ) + r ( k + N ) , 2 k =m and =
E r (k ) E r (k + N )
2
E r (k )r * (k + N )
}{
}
2
s2 SNR = 2 = 2 s + n SNR + 1
18
CCU Wireless Access Tech. Lab.
( , ) = ( ) cos(2 + ( )) ( ) Thue, the estimated frequency offset is 1 ( ) + n, n is an integer, 2 and the estimated symbol timing is ML =
ML = arg max{ ( ) ( )}
19
CCU Wireless Access Tech. Lab.
Frequency Synchronization
Non-data-aided Method (Via oversampling) Data-aided Method (Special training-symbol-block)
Wireless Access Tech. Lab. Non-data-aided Method (BPSK-OFDM case) Signal model in BPSK-OFDM system
The transmitted signal is
j nk 1 N 1 N si (k ) = , 0 k N 1 xi,ne N n =0 where N denotes the IFFT window size, 2
si (k ) presents kth sample of ith OFDM symbol, xi ,n presents the data of nth subcarrier in ith symbol interval. Because BPSK mapping is used, xi ,n is real value.
21
CCU Wireless Access Tech. Lab.
xi ,n e
n =0
N 1
2 nk N
1 = N
xi ,n cos(
n =0
N 1
2 nk ) N
2 j nk 1 N 1 1 N 1 2 N = imag imag (si (k ) ) xi ,ne = N xi,n sin( N nk ) N n =0 n=0 2 2 j n( N k ) j nk 1 N 1 1 N 1 N N = real xi ,n e e j 2n real (si ( N k ) ) = real xi ,n e N N n =0 n =0 2 j nk 1 N 1 1 N 1 2 N = = real xi ,ne xi,n cos( N nk ) = real si (k ) N N n=0 n =0 2 2 nk j n( N k ) j 1 N 1 1 N 1 j 2n N N = imag imag (si ( N k ) ) = imag e xi ,ne N xi ,n e n =0 N n =0
1 = imag N
xi ,ne
n =0
N 1
2 nk N
1 = N
xi ,n sin(
n =0
N 1
2 nk ) = imag (s i (k ) ) N
22
23
CCU Wireless Access Tech. Lab.
N , si (k ) can be expressed as 2 , k 0 or N 2
si ( N k ) = Ai ,k e
j i , N
2
j i ,k
si ( N 2) Ai , N 2 e
24
CCU Wireless Access Tech. Lab.
ri ( ) = vi (0) + wi ( )
CP
25
CCU Wireless Access Tech. Lab.
, 1 k CP
N 2
CP
Second group of symmetry relationship : When vi ( N 2) is taken as the central point for the two opposite samples vi (k ) and vi ( N k ), it has the character vi (k ) vi ( N k ) = Ai2,k e j 2 + j 2 , 1 k N 2 1
CP
+
N 2
26
CCU Wireless Access Tech. Lab.
Wireless Access Tech. Lab. Non-data-aided Method (BPSK-OFDM case) There are three kinds of useful property can be employed as follows:
The first group of symmetry relationship. The second group of symmetry relationship. The cyclic prefix copied from the tail of OFDM symbol.
27
CCU Wireless Access Tech. Lab.
Wireless Access Tech. Lab. Non-data-aided Method (BPSK-OFDM case) - Using angle
In second group of symmetry relationship, vi (k ) vi ( N k ) = Ai2,k e j 2 + j 2 where 1 k N 2 1.
C k = {Ck ,1 , Ck , 2 , Ck ,1 = angle(ri (k + 1) ri (k + N 1) ) Ck , N 21 = angle(ri (k + N 2 1) ri (k + N N 2 + 1) ) The mean of C is 1 N 21 E{C k } = 1 Ck ,m N 2 1 m= f {C k } =
N 2 1 m =1
, Ck , N 21 } where
N 2
CP
CP
When the central point of opposite samples is ri ( N 2 + ), phase of ri ( N 2 + ), and the cost function f {C } is zero for noise - free case.
28
CCU Wireless Access Tech. Lab.
the mean of C = {C ,1 , C , 2 ,
k ,m
E{C k }
Wireless Access Tech. Lab. Non-data-aided Method (BPSK-OFDM case) - Using angle
First useful property : 1 CP E{B k } = Bk ,m CP m =1 f {B k } = Bk ,m E{B k }
m =1 CP
Bk ,m = angle(ri (k + m) ri (k m) )
N 2
CP
Ck ,m = angle(ri (k + m) ri (k + N m) )
Fk f {B k }+ f {C k }+ f {D k }
+
N 2
k ,m
E{C k }
CP
)
+
N 2
CP
29
CCU Wireless Access Tech. Lab.
Wireless Access Tech. Lab. Non-data-aided Method (BPSK-OFDM case) - Using correlation
In second group of symmetry relationship, vi (k ) vi ( N k ) = Ai2,k e j 2 + j 2 where 1 k N 2 1.
i i
+
N 2
C (k ) =
N 2 1 m =1
r ( k + m) r ( k + N m)
CP
CP
When the central point of opposite samples is ri ( + N 2), k = , C ( ) has the maximum value in observation region.
30
CCU Wireless Access Tech. Lab.
Wireless Access Tech. Lab. Non-data-aided Method (BPSK-OFDM case) - Using correlation
First useful property : B(k ) =
r ( k + m) r ( k m)
m =1 i i
CP
N 2
CP
Second useful property : C (k ) =
N 2 1 m =1
r ( k + m) r ( k + N m)
i i
Fk B(k ) + C (k ) + D(k )
+
N 2
CP
Third useful property : D(k ) =
= arg max Fk
+
N 2
r ( k m) r ( k + N m )
* m =1 i i
CP
CP
31
CCU Wireless Access Tech. Lab.
Performance Analysis
10
0
AWGN channel
10
AWGN channel
10
-1
10
Mean-squared error
10
-2
10
10
-3
10
10
-4
10
-1
10
-5
10
-2
10
-6
10
-3
32
CCU Wireless Access Tech. Lab.
8 7 6
x 10
10 9 8 7
x 10
5 Statistics
6 Statistics 5 4 3
4 3 2
2
1 0
1 0 20
50 Time index, n
100
150
40
60
80 Time index, n
100
120
140
CP
CP
CP
33
Solution
Image part
Real part
34
CCU Wireless Access Tech. Lab.
Solution
Image part
Real part
35
CCU Wireless Access Tech. Lab.
Frequency Synchronization
Non-data-aided Method (Via oversampling) Data-aided Method (Special training-symbol-block)
d e
k =0 k
N 1
2k ( t t s ) T
where d k is used to modulate the subcarrier e j 2k T , t s is the starting time of the current OFDM symbol (excluding the guard time), T is the OFDM symbol duration (DFT/IDFT interval).
37
CCU Wireless Access Tech. Lab.
s1(n)
s2(n)
Ts 2Ts
( N 1)Ts T
38
[d 0 ,
, d N 1 ] ; and
j E = diag 1 e N
( N 1) N
39
CCU Wireless Access Tech. Lab.
41
CCU Wireless Access Tech. Lab.
~ where d = Hd with H being a diagonal matrix with diagonal element H (k ). The matrix E reflects the phase shift between x1 and x 2 due to the difference in subcarrier frequencies, while the phase shift due to the frequency offset differs by a scalar constant e j 2 . Where P = diag (1, e j , , e j ( N 1) )
42
CCU Wireless Access Tech. Lab.
(3) (4)
EH W H P H x2
It is straightfo rward to verify that in the absence of noise ~ (5) y1 = y 2 = d Thus it is intuitive to find such the resulting y 1 and y 2 are equal.
43
CCU Wireless Access Tech. Lab.
Above minimization criterion using maximumlikelihood principles is provided in the next section.
44
CCU Wireless Access Tech. Lab.
Frequency Synchronization
Non-data-aided Method (Via oversampling) Data-aided Method (Special training-symbol-block)
Wireless Access Tech. Lab. Data-aided Method (Special training-symbol-block) At the transmitter, the training-symbol-block contains two equal-length training symbols in time domain, and the second training symbol is the inverse repeat of the first one.
The training - symbol- block :
S = [s(0) ,s(1) , ,s( N 1) ,s( N 1) , ,s(1) ,s(0)] where N denotes the DFT length of training symbols.
46
CCU Wireless Access Tech. Lab.
Wireless Access Tech. Lab. Data-aided Method (Special training-symbol-block) At receiver, without considering of the channel attenuation and additive AWGN, the relationship between corresponding samples in a received trainingsymbol-block is :
r ( 2 N 1 k ) = r ( k ) e j 2 ( 2 N 1 2 k ) / N k [ 0 , N 1] to a
where r ( k ) denotes the k th sample and denotes the carrier frequency offset normalized subcarrier spacing of training symbols.
47
CCU Wireless Access Tech. Lab.
Wireless Access Tech. Lab. Data-aided Method (Special training-symbol-block) A timing metric is defined:
M (d ) = 2 r (2 N + d 1 k )r * (k + d )
k =0 d + 2 N 1 N 1
k =d
r (k )
2 r(k - d)r * (k + d )e j 2 ( 2 N + 2 d 1 2 k ) / N
k =0 d + 2 N 1
N -1
k =d
r (k )
49
CCU Wireless Access Tech. Lab.
51
CCU Wireless Access Tech. Lab.
At the transmitter, 2 identical training - symbol - blocks are transmitted. At the receiver, 3 N samples of the training sequence are buffered. The length of 3 N guarantees one integral training - symbol - block being buffered.
52
CCU Wireless Access Tech. Lab.
where k < N 4 and 0 < < N (2(2 N 1)) denotes the lookup interval.
53
CCU Wireless Access Tech. Lab.
54
CCU Wireless Access Tech. Lab.
Wireless Access Tech. Lab. Data-aided Method (Special training-symbol-block) After acquisition, if the remaining carrier frequency offset exceeds the tracking range, tracking algorithm will not work correctly, and this is called Missing Lock. For usable SNR, if N is large enough, the probability of Missing Lock is negligible.
55
CCU Wireless Access Tech. Lab.
Wireless Access Tech. Lab. Data-aided Method (Special training-symbol-block) After acquisition, the remaining frequency offset needs to be further corrected.
For a receivedtraining- symbol- block under certain SNR condition, the log - likelihood function for the carrier frequency offset , ( ) is the logarithmof the probability density function f ( | ) . ( ) = log f ( | ) N 1 = log f (r (k ), r (2 N 1 k )) k =0 = log( f (r (k ), r (2 N 1 k )))
k =0 N 1
56
CCU Wireless Access Tech. Lab.
)( )(
) )
where
E r (k ) E r (2 N 1 k )
2
E r (k )r * (2 N 1 k )
}{
}
2
}
57
CCU Wireless Access Tech. Lab.
N r (k )r * (2 N 1 k ) angle r (k )r * (2 N 1 k ) (2 N 1 2k ) 2 r (k )r * (2 N 1 k ) (2 N 1 2k )
k =0 N 1 2
In order to make the proposed tracking algorithm work correctly, angle r (k )r * (2 N 1 k ) < for each k [0, N 1] should satisfied, i.e., the tracking range is ( N /(2(2 N 1))) subcarrier spacing.
58
CCU Wireless Access Tech. Lab.
59
CCU Wireless Access Tech. Lab.
Frequency Synchronization
Non-data-aided Method (Via oversampling) Data-aided Method (Special training-symbol-block)
The discrete - time baseband equivalent OFDM signal transmitted through a frequency - selective fading channel is given by y[n] = h[m]x[n m]
m =0 L 1
61
CCU Wireless Access Tech. Lab.
where g[n] is the transmitter pulse shaping filter, N is the number of sub - carrier, ck ,l are the complex informatio n symbols.
62
CCU Wireless Access Tech. Lab.
At the receiver y[n] = y[n n ]e j ( 2 n + ) + w[n] where n is the integer - valued unknown arrival time of a symbol,
63
CCU Wireless Access Tech. Lab.
The following assumptions are hold in this paper : 1. ck ,l is a zero - mean independen tly identicall y distributed(i.i.d.) sequence with values drawn from a finite - alphabet complex constellation, with variance c2 . 2. For 0 n L 1, each h[n] is zero - mean independen t gaussian
2 random variable with variance h[ n ] .
64
CCU Wireless Access Tech. Lab.
The goal of synchronization is to estimate n and . The proposed algorithm is based on cyclostationarity of the receiver OFDM signal caused by pulse shaping filter.
65
CCU Wireless Access Tech. Lab.
}
N 1 k =0 j 2 k N
j 2
c2 e
g [n lP ]g *[n lP ] + rw [ ]
l =
g [n]g *[n + ]e
N 1 k =0 j 2 k N
2 kn P
+ rw [ ] [k ]
where [ ] = e
67
CCU Wireless Access Tech. Lab.
g [n]g *[n + ]e =e
j 2 12 k n P
2 kn P
k G * G ( )e j 2 d 2 P 1
68
CCU Wireless Access Tech. Lab.
Let G2 (k ; ) =
G * ( k P )G ( )e j 2 d .
2
Upon defining
M [k ; ] = G2 1 (k ; ) R y [k ; ] kn j 1 L 1 2 j 2 2 P = h[ m ] e c [ ]e + G2 1 (k ; )rw [ ] [k ] P m =0 2
69
CCU Wireless Access Tech. Lab.
Consider the case only k 0. For = 0, we can retrieve n from the phase of cyclic correlation 1 arg[M [k ;0]] for k > 0 2 k P Given timing offset n , the frequency offset can be derived as n =
k j 2 n 1 P = arg M [k ; N ] e 2N
Timing offset and frequency offset appear as the phase of cyclic correlation, and the impluse response of channel h[n] does not affect the phase of cyclic correlation.
70
CCU Wireless Access Tech. Lab.
Since we can not have access to ensemble cyclic quantity, we should estimate it from finite data samples. We obtain R [k ; ] from data set
y I {y[n]}n10 . If number of data I is large enough, Ry [k ; ] would be asymptotically =
71
CCU Wireless Access Tech. Lab.
The effect of imperfection of cyclic correlatio n can be potentially reduced average. The estimator is obtained by 1 1 Q 1 arg M [k ;0] n = 2 k P Q q =0
for k > 0
k j 2 n 1 1 Q 1 P = arg M [k ; N ] e 2N Q q =0
Thus, we can observe that the number of average, Q, increases the complexity of the estimator. Large Q makes more reliable estimation.
72
CCU Wireless Access Tech. Lab.
Reference
1) J.J. van de Beek, M. Sandell and P. O. Brjesson, ML
estimation of time and frequency offset in OFDM systems, IEEE Trans. Signal Processing, vol. 45, no. 7, pp. 1800-1805, July 1997. 2) B. Chen, H. Wang, Blind OFDM carrier frequency offset estimation via oversampling, 2001 IEEE, vol. 2, pp. 1465 1469, Nov. 2001. 3) Z. Zhang, M. Zhao, H. Zhou, Y. Liu, J. Gao, Frequency offset estimation with fast acquisition in OFDM system, IEEE Communications Letters, vol. 8, no. 3, pp. 171 173, Mar. 2004. 4) B. Park, H. Cheon, E. Ko, C. Kang, D. Hong, A blind OFDM synchronization algorithm based on cyclic correlation, IEEE Signal Processing Letters, vol. 11, no. 2, pp. 83 85, Feb. 73 2004.
CCU Wireless Access Tech. Lab.
74
CCU Wireless Access Tech. Lab.