WO1999053662A1 - System, device and method for improving a defined property of transform-domain signals - Google Patents

System, device and method for improving a defined property of transform-domain signals Download PDF

Info

Publication number
WO1999053662A1
WO1999053662A1 PCT/US1999/007840 US9907840W WO9953662A1 WO 1999053662 A1 WO1999053662 A1 WO 1999053662A1 US 9907840 W US9907840 W US 9907840W WO 9953662 A1 WO9953662 A1 WO 9953662A1
Authority
WO
WIPO (PCT)
Prior art keywords
symbols
perturbation
domain
vector
time
Prior art date
Application number
PCT/US1999/007840
Other languages
French (fr)
Inventor
Frank Robert Kschischang
Aradhana Narula
Jian Yang
Original Assignee
Motorola Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola Inc. filed Critical Motorola Inc.
Priority to JP2000544104A priority Critical patent/JP2002511707A/en
Priority to BR9909525-4A priority patent/BR9909525A/en
Priority to KR1020007011221A priority patent/KR20010042558A/en
Priority to EP99916577A priority patent/EP1068706A4/en
Priority to AU34870/99A priority patent/AU740189B2/en
Priority to CA002328145A priority patent/CA2328145A1/en
Publication of WO1999053662A1 publication Critical patent/WO1999053662A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/02Amplitude-modulated carrier systems, e.g. using on-off keying; Single sideband or vestigial sideband modulation
    • H04L27/04Modulator circuits; Transmitter circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2614Peak power aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2602Signal structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/32Carrier systems characterised by combinations of two or more of the types covered by groups H04L27/02, H04L27/10, H04L27/18 or H04L27/26
    • H04L27/34Amplitude- and phase-modulated carrier systems, e.g. quadrature-amplitude modulated carrier systems
    • H04L27/3405Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power
    • H04L27/3411Modifications of the signal space to increase the efficiency of transmission, e.g. reduction of the bit error rate, bandwidth, or average power reducing the peak to average power ratio or the mean power of the constellation; Arrangements for increasing the shape gain of a signal set

Definitions

  • This invention relates to a system, device and method for improving a defined property of transform-domain signals, and more particularly to a system and method for reducing the peak-to-average energy ratio (PAR) of time- domain signals.
  • PAR peak-to-average energy ratio
  • a large PAR requires implementation of a high-precision digital-to-analog converter (DAC), or else requires the system to be tolerant of signal distortion (clipping) introduced when input signals exceed the DAC range.
  • DAC digital-to-analog converter
  • clipping signal distortion
  • the second class of PAR reduction techniques is based on determining sequences which have good PAR properties. See for example, S. Shepherd, J. Orriss, and S. Barton, "Asymptotic limits in peak envelope power reduction by redundant coding in orthogonal frequency-division multiplex modulation," IEEE Trans, on Commun., vol. 46, pp. 5-10, Jan. 1998. These methods generally involve removing "bad" time-domain sequences from the set of possible transmitted symbols and thus result in a data rate loss. Furthermore, these methods require mapping the data to the "good” symbols. This map is generally accomplished via a lookup table. The size of the required lookup table becomes impractical in a DMT system with many tones and large constellation sizes.
  • PAR reduction is achieved via a redundant signal representation, in which a given data block can be represented by any of a number of possible transmitted signals from some equivalence class, with the "most desirable" class representative — in this case, a representative with small time-domain peak value— chosen for transmission.
  • the receiver is designed to operate "modulo equivalence classes" producing the data block associated with an equivalence class whenever it detects an element of that class. In this way, the receiver requires no knowledge of the precise algorithm used to select a class representative at the transmitter.
  • One way to operate "modulo equivalence classes" in the DMT case is to have the receiver simply ignore the contents of various frequency bins. See A. Gatherer and M.
  • FIG. 1A is a schematic block diagram of a DMT transmitter configured according to this invention.
  • FIG. 1 B is a schematic block diagram of an alternative DMT transmitter configuration according to this invention.
  • FIG. 2 is an expanded signal point constellation in accordance with this invention.
  • FIG. 3 is an alternative expanded signal point constellation in accordance with this invention
  • FIG. 4 is a block diagram of the perturbation selector of FIG. 1 A;
  • FIG. 5 is an illustration of the perturbation vectors of the modulo M k perturbation device of FIG. 4;
  • FIG. 6 is a flow diagram illustrating a perturbation vector search used by the modulo M k perturbation device of FIG. 4
  • FIG. 7 is a flow diagram illustrating an alternative perturbation vector search used by the modulo M k perturbation device of FIG. 4;
  • FIG. 8 depicts a set of perturbation vectors according to this invention.
  • FIG. 9 depicts a three dimensional table used in the perturbation vector search illustrated in the flow diagram of FIG. 10;
  • FIG. 10 is a flow diagram illustrating another alternative perturbation vector search used by the modulo M k perturbation device of FIG. 4;
  • FIG. 11 is a schematic block diagram of the receiver depicted in FIGS. 1A and 1 B;
  • FIG. 12 is a schematic block diagram of an alternative perturbation selector according to this invention
  • FIG. 13 is a schematic block diagram of another alternative perturbation selector according to this invention.
  • FIG. 14 is a flow diagram of a perturbation vector search performed by the alternative perturbation selectors of FIGS. 15-18;
  • FIG. 15 is a flow diagram illustrating the operation of another alternative perturbation selector according to this invention.
  • FIG. 16 is a flow diagram illustrating the operation of yet another alternative perturbation selector according to this invention.
  • FIG. 17 is flow diagram illustrating the operation of another alternative perturbation selector according to this invention.
  • FIG. 18 is flow diagram illustrating the operation of another alternative perturbation selector according to this invention.
  • the present invention is generally directed to a system and method for improving a defined property of a signal after block transformation, hereinafter referred to as a transform-domain signal.
  • a transform-domain signal In order to provide a more readily understandable description of the invention we describe herein an actual application of the invention to reduce the peak-to-average energy (PAR) of the time-domain signal (more generally referred to herein as the transform-domain signal) in discrete multitone modulation schemes.
  • PAR peak-to-average energy
  • the invention is generally applicable to other modulation schemes, such as orthogonal frequency division multiplexing (OFDM), orthogonal quadrature amplitude modulation (OQAM), and discrete wavelength multitone (DWMT).
  • OFDM orthogonal frequency division multiplexing
  • OFQAM orthogonal quadrature amplitude modulation
  • DWMT discrete wavelength multitone
  • the invention may be used to improve other defined properties in the transform- domain signal in addition to PAR.
  • a DMT transmitter 10 that includes a signal mapper 12 which receives input data and outputs a sequence of blocks of frequency-domain symbols X, (X 0 -X N - ⁇ )- Each symbol in a block corresponds to a different frequency bin and for each frequency bin signal mapper 12 selects a symbol from a constellation of points.
  • Signal mapper 12 chooses the constellation for each frequency bin based on the channel quality for the frequency bin.
  • the channel quality is typically determined by probing the channel during a training sequence.
  • the size of the constellation, and hence the number of input data bits that can be represented by the symbol chosen from the constellation is dependent upon the quality of the channel in the frequency range of the bin.
  • a channel having better quality can use a denser constellation with more points and therefore more bits can be transmitted with each symbol.
  • the number of input data symbols represented by a block of symbols is dependent upon the quality of the channel.
  • the output of the signal mapper 12 is X 0 -X 31 .
  • ADSL digital subscriber line
  • There are symbols transmitted in the lower fifteen complex frequency bins (XrX 15 ) and the upper fifteen complex frequency bins (X 17 -X 31 ) are selected as the complex conjugate images of the lower fifteen bins so that the resulting frequency-domain signal possesses the Hermitian symmetry needed to make the time-domain signal real-valued.
  • Inverse Discrete Fourier Transform (IDFT) device 14 receives each block or vector of frequency-domain symbols X, X 0 -X N- ⁇ . and transforms them into blocks or vectors of time-domain symbols x, x 0 -x N-1 , which are provided to perturbation selector 16. IDFT device 14 and perturbation selector 16 together form perturbation transform device 17. In other applications different types of invertible transform devices may be used and the outputs of the IDFT and the other invertible transform devices may generally be referred to as the transform- domain symbols.
  • Perturbation selector 16 perturbs the time-domain symbols, as described in detail below, in order to reduce the PAR (or, more generally, improve a defined property) of the transmitted symbols and outputs blocks or vectors of perturbed or modified time-domain symbols y, y 0 -y N . ⁇ - Perturbed or modified time-domain symbols y are provided to parallel to serial converter 18 and these symbols are transmitted in serial form over the channel to receiver 19.
  • perturbation selector 16 perturbs the time-domain symbols, or more generally the transform-domain symbols
  • transmitter 10' has a perturbation selector 16' which perturbs the symbols prior to IDFT device 14, i.e. in this example, the frequency-domain symbols would be modified instead of the time-domain symbols.
  • Perturbation selector 16' and IDFT 14 together form perturbation transform device 17'.
  • the prior art techniques for reducing PAR do so by either placing values in "unused" frequency bins and/or complex frequency bins which transmit data. In some cases the channel quality may be so poor in some frequency bins that several complex frequency bins in addition to the DC and Nyquist bins are not used to transmit data.
  • Perturbation selector 16 uses the complex data carrying frequency bins to reduce PAR without affecting the data rate using a technique referred to herein as modulo M k perturbation and additionally uses the unused frequency bins (DC, Nyquist and N/4) in novel ways to further reduce PAR.
  • modulo M k perturbation uses the unused frequency bins (DC, Nyquist and N/4) in novel ways to further reduce PAR.
  • DC, Nyquist and N/4 the unused frequency bins
  • Modulo M k Perturbation With this approach, the signal constellations are expanded relative to the minimum necessary constellation size to support the given data rate in each complex frequency bin and the expanded constellation is partitioned into equivalence classes.
  • the receiver 19, FIGS. 1A and 1 B, is designed to detect equivalence classes (not individual constellation points or symbols). This provides the transmitter some flexibility in choosing the transmitted symbols. This extra degree of freedom can be used to optimize some objective function of the resulting signal— in particular, the time-domain peak amplitude.
  • the objective function is optimized without a reduction in the transmitted bit rate, but the transmit power must be increased to accommodate the additional points in the expanded signal constellations.
  • significant PAR reduction can be achieved with almost no increase in the average signal power, so the net performance penalty is negligible.
  • Expanded constellation 20 includes a base constellation 22 (the constellation in the innermost dashed box) containing points A, B, C and D, from which the symbols are chosen by signal mapper 12, FIG.1. Expanded constellation 20 also includes expansion areas 24, 26, 28 and 30 each containing four points labeled A-D. All of the constellation points having the same label, i.e.
  • A are elements of the same equivalence class and a receiver receiving any one of the points in the equivalence class decodes the point into the same data.
  • a receiver receiving any one of the points in the equivalence class decodes the point into the same data.
  • the time-domain peak value can be reduced.
  • Every block of symbols X contains N symbols, (X 0 -X N- ⁇ ). each of which is modulated on a separate carrier frequency.
  • the transmitted time-domain signal vector is given by the inverse Fourier Transform as follows:
  • F the Fourier Transform matrix
  • H denotes Hermitian transpose.
  • these complex symbols X k are chosen from an L 2 k -QAM constellation, corresponding to transmitting 2log 2 L k bits on complex frequency k.
  • Each L 2 k - QAM constellation may altematively described as the Cartesian product of two independent L k -PAM constellations, one for each real and imaginary component of symbol X k .
  • a value m k is defined as the largest of the PAM signal magnitudes in the kth channel and d k is the distance between the PAM symbols.
  • a value M k is equal to 2m k +d k . The value M k is used to define the equivalence class points in the expanded constellation.
  • the base constellation may be expanded to include for each base constellation point all points that are congruent to each of the base constellation points modulo-M k in either of the two real and imaginary dimensions. All points congruent modulo-M k are considered to be in the same equivalence class. See, for example, that one of the points "A" in expansion area 24 outside of the base constellation 22 is +Mk from point "A" in base constellation 22. Also, another point “A” in expansion area 26 is +jMk from point "A” in base constellation 22.
  • the receiver implements a modulo-M k operation in the real and imaginary components of the kth complex frequency so that any translation of the received symbol by a multiple of M k in dimension k is transparent to the receiver. It should be noted that other expanded constellations are possible and will be apparent to those skilled in the art.
  • each equivalence class could contain an infinite number of points which are multiples of M k away from the point in the base constellation; however, as described below, it is practical to choose the points that are close (e.g., 1M k ) to the points in the base constellation to achieve PAR reduction while minimizing the transmitter power requirements.
  • the base constellation 22 of FIG. 2 may be expanded to constellation 40, FIG. 3.
  • This expanded constellation includes base constellation 42 and expansion areas 44, 46, 48, 50, 52 and 54.
  • the receiver would then be required to operate modulo ⁇ .
  • a wide variety of similar possible perturbation sets involving other sublattices of the integer lattice in one, two, or more dimensions, are possible.
  • signal constellations based on other lattices for example, the hexagonal lattice in two dimensions, still other perturbations sets are appropriate, as will be apparent to persons skilled in the art.
  • the perturbation selector 16 is shown in more detail to include modulo M k perturbation device 60, which perturbs the block of time-domain symbols x to form a plurality of blocks of modified symbols z it (z, 0 - Z. N ..,).
  • modulo M k perturbation device 60 which perturbs the block of time-domain symbols x to form a plurality of blocks of modified symbols z it (z, 0 - Z. N ..,).
  • There is an unused frequency bin perturbation device 62 which further modifies the blocks of symbols Z; by adding energy to the unused (DC and Nyquist) frequency bins, forming blocks of symbols z '.
  • selection device 64 which selects the block of modified symbols z' that has the minimum peak, in the case of PAR reduction, or generally, selects the block of symbols which most improves the defined property.
  • Modulo M k perturbation device 60 modifies the block of time-domain symbols x by adding to it all valid perturbation vectors V;, (v i 0 -v i N ..,), forming modified blocks or vectors, z,, of time-domain symbols. As discussed below, the modified blocks or vectors of symbols, z are further modified by unused frequency bin perturbation device to form vectors, z , from which the vector with the minimum peak is chosen and its symbols are transmitted as output symbols y, y 0 -y N-1 . Perturbation selector 16 operates in the time-domain to perturb the symbols, however, it can be readily modified to operate in the frequency- domain for use in transmitter 10' depicted in FIG. 1B.
  • any perturbation vector V (V 0 -V N . 1 ), such that each V k is an integer multiple of M k in the kth dimension, may be added to the block of symbols X, (X Q -X N . T ), as a valid perturbation vector as is done in perturbation selector 16', FIG. 1 B.
  • the perturbation vector is added in the time-domain; therefore, all valid perturbation vectors V, must be transformed from the frequency to the time-domain and added to the blocks of time-domain symbols x. Since the requirement for a valid perturbation vector is that each V k be an integer multiple of M k in the kth dimension, there are therefore an infinite number of valid perturbation vectors.
  • Signal mapper 12 maps input data to a block of (not necessarily optimum) N symbols or class representatives which are chosen from the base constellations, and then modulo M k perturbation device 60 operates in the transform-domain by searching for the best valid perturbation, where a perturbation is valid if it transforms a given block of symbols to another block of symbols, which are symbol by symbol in the same equivalence class.
  • N-2 frequency bins which can be perturbed.
  • Each frequency bin can be perturbed by one of four non-zero perturbations, namely, +M k , -M k , +jM k and
  • the block of time-domain symbols x,(x 0 -x N ..,), is added to each of the valid perturbation vectors V j , (v 0 through v 2 , N . 2) ), to produce vectors z,, (z 0 through z 2(N . 2) ) .
  • the frequency-domain perturbation vector V 0 is the all zero perturbation vector.
  • the frequency-domain perturbation vectors must be transformed into a time-domain perturbation vector v, before being added to the time-domain symbols x.
  • the Inverse Discrete Fourier transform, v impart of these 2(N-2) vectors (and the all zero vector) V may, for example, be stored in memory and used to perturb the time-domain symbols x as illustrated in flow diagram 70, FIG. 6.
  • step 72 the next block of time-domain symbols x is obtained from IDFT device 14, FIG. 1, and in step 74 x is added to vector v ( to form z,.
  • step 76 z t is provided to unused frequency bin perturbation device 62, FIG. 4.
  • step 78 i becomes i+1 and in step 80 it is determined if i is greater than 2(N-2)+1 , i.e., have all 2(N-2)+1 vectors (including the all zero vector) been added to the present block of symbols x. If not, then the flow proceeds to step 74 where x is added to the next perturbation vector v,. If i is greater than 2(N-2)+1 , then in step 82 i is set to zero and flow returns to step 72 where the next block of symbols is obtained. It must be noted that the each block of time-domain symbols z, is provided to the unused frequency bin perturbation device 62, FIG. 4.
  • PAR reduction performance is expected to increase as the search space is enlarged. For example, where up to two non-zero components are allowed in the perturbation vector V,. This requires searching over an additional (N-2) * (N- 3) possible vectors. Although searching over this larger space provides a greater time-domain peak reduction, performance improvement may not be significant enough to warrant the tremendous increase in complexity. For larger values of N, (e.g. 256), it may be useful to allow perturbations of +/- 2M k or larger multiples of M k as well.
  • each of the vectors z from modulo M k perturbation device 60 is modified by unused frequency bin perturbation device 62 and the modified vectors Z j ' are provided to modified
  • ⁇ symbol selection device 64 where the modified vector z with the smallest peak is chosen and transmitted as symbols y 0 -y N .
  • DC and Nyquist Bins This technique can be used when the DC and Nyquist bins are unused.
  • Shifting the even symbols of z ; by one value and shifting the odd symbols of z- t by another value is equivalent to changing the values of both the DC and Nyquist frequency components of corresponding frequency-domain vector Z r
  • the even symbols are defined as any component z, of the vector z for which i is even and the odd symbols are defined as any component z, of the vector z for which i is odd.
  • the time-domain peak of z, is reduced by adding to the odd symbols of z,:
  • Odd perturbation - (TM* ⁇ ('J + TM. «(*,)) (4)
  • Symbols z 3 , z 7 , z etc. of vector z, are shifted by
  • Z j ' is equal to Z, modified by Z 0 ⁇
  • max and min are the maximum and minimum values of the time-domain vector Zj.
  • Zj' should be equal to Z j modified by Z N/2 as described below:
  • the search method described above with regard to FIG. 6 involves 5 searching all 2(N-2)+1 perturbation vectors v, in the modulo M k perturbation device 60 to determine which most reduces PAR or most improves the defined property of the transform-domain signal. Described below, there are two alternative search methods which reduce the complexity of the search for the perturbation vector which most reduces PAR or most improves the defined
  • the next block or vector x of time-domain symbols is obtained, step 92.
  • the peak value for the symbols x 0 -x N . 1 ( peak(x), in time-domain symbol vector x is determined and the
  • 35 peak time sample location, I is also determined, step 94. Then, a limited set of all nonzero 2(N-2) perturbation vectors V j is established. That set of vectors, V j ', includes each of the N-2 perturbation vectors corresponding to +M k , +jM k .
  • N-2 perturbation vectors are simply negatives of these N-2 perturbation vectors Vj'.
  • the vector Vj' is compared to x and it is determined if the sign of the vector v,' at location I is equal to the sign of the peak(x), step 100. If it is, then at step 102 that vector is subtracted from x, thereby forming z> which is provided to unused frequency bin perturbation device 62, FIG. 4. In step 104, j becomes j+1 and in step 106 i becomes i+1.
  • step 108 it is determined if i is greater than N-2. If it is, this indicates all N-2 nonzero vectors (and the all zero vector) have been considered and flow proceeds to step 110 where i and j are set to zero and then the next block or vector x of time-domain symbols is obtained.
  • step 112 it is determined if the sign of the vector Vj at location I is the opposite sign of the sign of the peak(x). If it is, then that vector is added to x in step 114, thereby forming z, which is provided to unused frequency bin perturbation device 62, FIG. 4. In step 104 j becomes j+1 and in step 106 i becomes i+1. And, as described above, in step 108 it is determined if i is greater than N-2.
  • step 110 If it is, this indicates all N-2 nonzero vectors (and the all zero vector) have been considered and flow proceeds to step 110 where i is reset to zero and then the next block or vector x of time-domain symbols is obtained. If in step 112 it is determined that the sign of vector v, at location I is not the opposite sign as the sign of the peak (x), then the system moves to step 106 where i becomes i + 1 and flow proceeds as described above.
  • FIGS. 8-10 Another alternative search method is depicted in FIGS. 8-10. This method successively reduces the search space by eliminating perturbation vectors which do not sufficiently reduce the peak at each time sample.
  • the set includes 2(N-2)+1 time-domain perturbation vectors if we allow one real or imaginary component of one frequency bin to be perturbed by +/-M k and include the all zero perturbation vector.
  • the vectors each include N components corresponding to the number of time symbols. Each component in the vectors may be represented as v,,, where i indicates the
  • the third dimension is a set of vectors one corresponding to each time index j and each of the N/2+1 I's, where the ith component of the corresponding 2(N-2)+1 point vector is a one if v, j in set 120 is greater than vals(l). Otherwise, the value of the ith component of the 2(N-2)+1 point vector is a zero.
  • This three dimensional table is used in the perturbation vector search algorithm, described below.
  • a threshold, T which is the maximum allowable peak after the modulo M k perturbation. Since the unused frequency bin perturbation device further reduces the peak, this is not necessarily the maximum allowable peak of the system.
  • the threshold, T is system dependent and is chosen to be some value to which it is desired to reduce the peak.
  • Another value, A which is the maximum perturbation, is set equal to 2M/ N . With a +/-M k perturbation in one real or imaginary component of one frequency bin, this is the largest perturbation in a time-domain sample generated. Then, a vector goodT is defined. This vector initially has each of its 2(N-2)+1 components set to one, [1 ,1 ,..., 1].
  • the components correspond to the 2(N-2)+1 perturbation vectors of the set of vectors 120, FIG. 8, and a one indicates that the corresponding vector is a "good" vector and should be considered for reducing PAR, while a zero indicates that the vector is not a good candidate and should not be considered.
  • the flow diagram 140 describes how the vector goodT is established for each block of time-domain symbols x (x 0 -x N . ⁇ ) obtained, step 142.
  • the time index, j is set to zero.
  • the time index, j is incremented to the next time sample and in step 150 it is determined if j>N-1. If it is, this indicates that all of the symbols in block x have been considered.
  • step 152 from the vector goodT the "good" vectors, or some subset thereof, are used to produce the blocks of modified symbols Z j which are provided to
  • step 142 the next block of symbols x is obtained. If it is determined that j is not greater than N-1 in step 150, flow loops back to step 146.
  • step 154 it is determined if
  • the index j indicates time, e.g., 0, 1...N-1 , and pertindexl , calculated as described below, indicates which of the set of N/2+1 vectors corresponding to time index j the vector is to be chosen.
  • a value for pertindexl is calculated by first determining a value for maxp as follows:
  • pertindexl is calculated as follows:
  • inverse cosine may be determined by using a stored lookup table and "ceil" corresponds to rounding up to the nearest integer. Pertindexl could also alternatively be determined from maxp directly using a stored lookup table. After goodT has been set in step 156, the time index j is incremented in step 148 and flow proceeds as described above.
  • step 154 If in step 154 it is determined that
  • the index j indicates time, e.g., 0, 1...N-1 , and pertindex2, calculated as described below, indicates which of the set of N/2+1 vectors corresponding to time index j the vector is to be chosen.
  • a value for pertindex2 is calculated by first determining a value for minp as follows:
  • pertindex2 is calculated as follows:
  • inverse cosine may be determined by using a stored lookup table and "ceil" corresponds to rounding up to the nearest integer.
  • Pertindex2 could also alternatively be determined from minp directly by using a stored lookup table.
  • step 158 If in step 158 it is determined that
  • the vector goodT is evaluated.
  • a one in any component of that vector indicates that the corresponding vector in the set of vectors 120, FIG. 8, is a good candidate for a perturbation vector.
  • the first involves choosing any one of the good vectors, adding it to the present block of symbols x to form a block of modified symbols and providing the block of modified symbols to the unused frequency bin perturbation device.
  • Another option involves adding each of the good vectors to the present block of symbols x to form blocks of modified symbols and providing the blocks of modified symbols to the unused frequency bin perturbation device.
  • Yet another option involves adding some specified number of the good vectors to the present block of symbols x to form blocks of modified symbols and providing the blocks of modified symbols to the unused frequency bin perturbation device.
  • the first option reduces complexity but also reduces performance to a certain degree.
  • performance loss should be minimal, but complexity reduction is not as significant as option 1.
  • option 3 the balance between performance and complexity reduction falls between options 1 and 2.
  • table 130 must be modified if all the M k 's are not equal. Two options for modifying table 130 are described below.
  • each base constellation is expanded modulo-M.
  • table 130 is generated assuming that the kth base constellation is expanded modulo-M k and that different values of M k are possible for different frequency bins k. This implies that the time sample values of the valid perturbation vectors can take on more than N/2+1 values.
  • maxval and minval denote the maximum and minimum values that the components of the valid perturbation vectors take on. Equivalent ⁇ , maxval will be equal to
  • the table size may be larger.
  • Pertindexl floor( (maxp - minval)/granularity) where floor corresponds to rounding down to the nearest integer
  • Pertindex2 ceil((minp-minval)/granularity) where ceil corresponds to rounding up to the nearest integer.
  • Receiver 19 In FIG. 11 there is shown a schematic block diagram of receiver 19 depicted in FIGS. 1A and 1 B.
  • the modified symbols y after going through the channel, are received as symbols w at receiver 19.
  • Receiver 19 includes a serial to parallel converter 170 which receives the time-domain symbols w in serial form and converts them to blocks of received time-domain symbols w, w 0 - w N .,.
  • the blocks of received time-domain symbols w, w 0 -w N .., are provided to Discrete Fourier Transform device 172 which converts the time domain symbols
  • the blocks of received frequency-domain symbols W, W 0 -W N _. are provided to Frequency domain equalizer device 174 which takes into account the effect of the channel on the transmitted modified frequency domain symbols Y, Y 0 -Y N - ⁇ . and scales the received symbols W, W 0 -W N ..,, to produce symbols Y', Y' 0 -YV ⁇ which are estimates of the transmitted symbols Y.Yo-Y ⁇ .
  • the estimates of the transmitted symbols are provided to inverse signal mapper 176 which converts the estimates of the transmitted modified frequency domain symbols Y', Y' 0 -Y' N - I, into output bits 178 corresponding to the input bits provided to transmitters 10 and 10' of FIGS. 1 A and 1 B, respectively.
  • Inverse signal mapper 176 is designed to detect equivalence classes (not individual constellation points or symbols) or it is said to operate modulo equivalence classes.
  • the symbols Y', Y' 0 -YV ⁇ . correspond to estimates of the frequency-domain points selected from e.g., expanded constellation 20, FIG. 2, however, they may not be equal to those constellation points due to noise on the channel.
  • inverse signal mapper 176 must account for this channel noise when inverse mapping the symbols to output bits 178.
  • the inverse signal mapper may first map each of the symbols Y' 0 -Y' N - I to the nearest point in the expanded constellation and then map this expanded constellation point to the equivalent point in the base constellation.
  • Other possible implementations of the inverse signal mapper will be clear to those skilled in the art.
  • alternative Perturbation Selectors In alternative perturbation selector 16a, Fig 12, the modulo-M k perturbation is applied to the input symbols b times. The number of times that the modulo-M k perturbation should be applied will be dependent on block size N and desired system complexity. Each iteration (i.e. each time the modulo-M k perturbation is applied), the peak of the time domain symbol is reduced. The reduction will decrease to zero after several iterations.
  • Perturbation selector 16b is very similar to perturbation Selector 16a. The only difference is that before being passed to the first stage modulo- M k perturbation device 180, the input symbol x is provided to unused frequency bin perturbation device 190 which chooses the unused frequency bin perturbations to minimize the peak value of x. Oftentimes, applying the unused frequency bin perturbation device prior to the modulo-M k perturbations will allow the peak value to be reduced more quickly in the first few stages. However, it may also lead to a slightly higher peak value after several stages. In other words, after a sufficient number of stages perturbation Selector 16a may produce a symbol with lower peak value than perturbation Selector 16b.
  • FIGS. 15-18 A number of alternative perturbation selectors are shown in FIGS. 15-18. These alternative perturbation selectors apply several iterations of perturbations derived from a reduced complexity perturbation vector search which is illustrated in flow diagram 200, FIG 14.
  • the operation of flow diagram 200, steps 202-220, is essentially the same as that of flow diagram 140, FIG. 10, and is therefore not described again.
  • the reduced complexity perturbation search achieves its threshold T, the threshold T is reduced. If the threshold is not achieved, the threshold is raised. If the number of iterations allocated, numloops, have not been completed, the reduced complexity perturbation search is applied to the modified symbols and another perturbation is determined.
  • the thresholds T and the number of iterations, numloops are system dependent. Note that the amount that T is raised or lowered does not have to be the same at each iteration.
  • step 232 the next blocks of time-domain symbols x and an initial threshold T are obtained and in step 234 an index k is initialized to zero.
  • step 236 using the symbol x and threshold T the reduced complexity perturbation search (flow diagram 200, FIG. 14) which determines a set of "good" perturbation vectors, described by goodT, is performed.
  • the first good vector is chosen first, i.e.
  • step 242 the threshold T is lowered and in step 244 the index k is incremented. It is then determined in step 246 if k ⁇ numloops. If it is then the reduced complexity perturbation search is performed again with the
  • step 268 it is determined that goodT is not non-zero, the threshold T is raised in step 280, but the index k is not incremented. Instead, flow proceeds to step 266 where the reduced complexity perturbation search is performed without incrementing the index k. In this implementation the time- domain symbol's peak value is always reduced numloops times. This may lead to a lower peak value.
  • two additional alternative perturbation selectors are illustrated in flow diagram 290, FIG. 17, steps 292-312 and flow diagram 320, FIG. 18, steps 322-342.
  • these perturbation selectors is similar to the operation of the selectors of FIGS. 15 and 16, respectively.
  • the only difference is that the input time-domain symbols x, prior to being used in the reduced complexity perturbation search (step 298, FIG. 17 and step 328, FIG. 18) for the first time, are modified by performing an unused frequency bin perturbation (step 294, FIG. 17 and step 324, FIG. 18) which uses the unused frequency bin perturbations to reduce the peak value of x. Then a reduced complexity perturbation search is performed on the modified symbol.
  • this invention may be embodied in software and/or firmware, which may be stored on a computer useable medium, such as a computer disk or memory chip.
  • the invention may also take the form of a computer data signal embodied in a carrier wave, such as when the invention is embodied in software/firmware, which is electrically transmitted, for example, over the Internet.

Abstract

In a transmitter (10) for transmitting data in blocks over a channel to a receiver (19), a device for improving a defined property of transform-domain symbols, the device, including: a signal mapper (12) which maps the input data into blocks of symbols in a first domain; wherein each of the symbols is chosen from a base constellation contained in an expanded constellation having expansion symbols, and wherein at least some of the symbols in the base constellation have one or more corresponding expansion symbols; and a perturbation transform device (14 and 16), responsive to the blocks of symbols, which produces for each block of symbols in the first domain a block of perturbed transform-domain symbols in order to improve a defined property of the transform-domain symbols.

Description

SYSTEM, DEVICE AND METHOD FOR IMPROVING A DEFINED PROPERTY
OF TRANSFORM-DOMAIN SIGNALS
Related Application
This application is a continuation-in-part of US Application No.
09/058,671 (Attorney Docket No. CX098006), filed April 10, 1998, which is hereby incorporated by reference in its entirety.
Field Of Invention
This invention relates to a system, device and method for improving a defined property of transform-domain signals, and more particularly to a system and method for reducing the peak-to-average energy ratio (PAR) of time- domain signals.
Background Of invention The large time-domain peak-to-average energy ratio (PAR) of discrete multitone (DMT) signals is often cited as a major disadvantage of DMT systems. This problem exists in systems using other modulation schemes as well, such as in systems using orthogonal frequency division multiplexing (OFDM) and orthogonal quadrature amplitude modulation (OQAM).
A large PAR requires implementation of a high-precision digital-to-analog converter (DAC), or else requires the system to be tolerant of signal distortion (clipping) introduced when input signals exceed the DAC range. For a fixed DAC precision, scaling the input signal so that signal values are always within range may result in excessive quantization noise; on the other hand, insufficient signal scaling may result in excessive clipping noise.
A number of approaches to reduce the time-domain peak amplitude of DMT and OFDM symbols have been proposed. These techniques can be divided into three classes. In the first class, multiple symbols are used to represent the same data and side information, transmitted on reserved tones, is used to tell the receiver which of the symbols was transmitted. For example in J.S. Chow, J.A.C. Bingham, and M.S. Flowers, "Mitigating clipping noise in multicar er systems," Proc. 1997 Int. Conf. Commun. (ICC'97), pp. 715-719, June 1997, if the peak of the DMT symbol is too high, the DMT symbol is scaled and reserved tones are used to relay the scaling factor to the receiver. This technique reduces the signal-to-noise ratio (SNR) of the transmitted symbol and thus results in an increased bit error rate. In Djokovic, "PAR reduction without noise enhancement", submission T1E1.4/97 270 to ADSL Standard Issue 2, Sept. 1997, the transmitter chooses between the original DMT symbol and its conjugate formed by scrambling the original symbol. In D.J. Mestdagh and P.M. Spruyt, "A method to reduce the probability of clipping in DMT-based transceivers," IEEE Trans. On Commun., vol. 44. 1234-1238, Oct. 1996, a pseudo-random phase sequence is added to the original DMT symbol. The most significant drawback with this class of techniques is that the transmitter must relay side information about the transmitted symbol to the receiver. In addition to incurring a data rate loss or an increase in bandwidth, if the side information is corrupted, the entire DMT symbol will be destroyed.
The second class of PAR reduction techniques is based on determining sequences which have good PAR properties. See for example, S. Shepherd, J. Orriss, and S. Barton, "Asymptotic limits in peak envelope power reduction by redundant coding in orthogonal frequency-division multiplex modulation," IEEE Trans, on Commun., vol. 46, pp. 5-10, Jan. 1998. These methods generally involve removing "bad" time-domain sequences from the set of possible transmitted symbols and thus result in a data rate loss. Furthermore, these methods require mapping the data to the "good" symbols. This map is generally accomplished via a lookup table. The size of the required lookup table becomes impractical in a DMT system with many tones and large constellation sizes.
In the third class of schemes, PAR reduction is achieved via a redundant signal representation, in which a given data block can be represented by any of a number of possible transmitted signals from some equivalence class, with the "most desirable" class representative — in this case, a representative with small time-domain peak value— chosen for transmission. In such schemes, the receiver is designed to operate "modulo equivalence classes" producing the data block associated with an equivalence class whenever it detects an element of that class. In this way, the receiver requires no knowledge of the precise algorithm used to select a class representative at the transmitter. One way to operate "modulo equivalence classes" in the DMT case is to have the receiver simply ignore the contents of various frequency bins. See A. Gatherer and M. Polley, "Controlling clipping probability in DMT transmission," Conf. Record 31st Asilomar Conf. On Sign. Sys. And Comp., pp. xx-yy, Nov. 1997; A. Gatherer and M. Polley, "Proposed PAR Reduction Techniques for G.lite," Universal ADSL Technical Group Contribution TG/98-025, Feb. 4, 1998; J. Tellado and J.M. Cioffi, "PAR reduction in multicarrier transmission systems," contribution 97-367 to T1E1.4 standards committee, Dec. 1997. For any given data block, the transmitter can place values in these unused bins to minimize (as far as possible) the peak value of the transmitted time-domain signal. These techniques incur a significant data rate loss since several bins are not used to transmit data.
Therefore, there exists a need for a PAR reduction technique which utilizes the data carrying or complex frequency bins in DMT modulation schemes to reduce PAR without affecting the data rate and which also utilizes the unused frequency bins to further reduce PAR. There is also a need for such a technique which can be applied generally to other modulation schemes and to improve other properties of the time-domain, or, in general, the transform-domain signal.
Brief Description of the Drawings
FIG. 1A is a schematic block diagram of a DMT transmitter configured according to this invention;
FIG. 1 B is a schematic block diagram of an alternative DMT transmitter configuration according to this invention;
FIG. 2 is an expanded signal point constellation in accordance with this invention;
FIG. 3 is an alternative expanded signal point constellation in accordance with this invention; FIG. 4 is a block diagram of the perturbation selector of FIG. 1 A;
FIG. 5 is an illustration of the perturbation vectors of the modulo Mk perturbation device of FIG. 4;
FIG. 6 is a flow diagram illustrating a perturbation vector search used by the modulo Mk perturbation device of FIG. 4; FIG. 7 is a flow diagram illustrating an alternative perturbation vector search used by the modulo Mk perturbation device of FIG. 4;
FIG. 8 depicts a set of perturbation vectors according to this invention;
FIG. 9 depicts a three dimensional table used in the perturbation vector search illustrated in the flow diagram of FIG. 10; FIG. 10 is a flow diagram illustrating another alternative perturbation vector search used by the modulo Mk perturbation device of FIG. 4; FIG. 11 is a schematic block diagram of the receiver depicted in FIGS. 1A and 1 B;
FIG. 12 is a schematic block diagram of an alternative perturbation selector according to this invention; FIG. 13 is a schematic block diagram of another alternative perturbation selector according to this invention;
FIG. 14 is a flow diagram of a perturbation vector search performed by the alternative perturbation selectors of FIGS. 15-18;
FIG. 15 is a flow diagram illustrating the operation of another alternative perturbation selector according to this invention;
FIG. 16 is a flow diagram illustrating the operation of yet another alternative perturbation selector according to this invention;
FIG. 17 is flow diagram illustrating the operation of another alternative perturbation selector according to this invention; and FIG. 18 is flow diagram illustrating the operation of another alternative perturbation selector according to this invention.
Description of a Preferred Embodiment
The present invention is generally directed to a system and method for improving a defined property of a signal after block transformation, hereinafter referred to as a transform-domain signal. In order to provide a more readily understandable description of the invention we describe herein an actual application of the invention to reduce the peak-to-average energy (PAR) of the time-domain signal (more generally referred to herein as the transform-domain signal) in discrete multitone modulation schemes. It will be apparent to those skilled in the art that the invention is generally applicable to other modulation schemes, such as orthogonal frequency division multiplexing (OFDM), orthogonal quadrature amplitude modulation (OQAM), and discrete wavelength multitone (DWMT). Moreover, it will be apparent to those skilled in the art that the invention may be used to improve other defined properties in the transform- domain signal in addition to PAR.
There is shown in FIG. 1A a DMT transmitter 10 that includes a signal mapper 12 which receives input data and outputs a sequence of blocks of frequency-domain symbols X, (X0-XN-ι)- Each symbol in a block corresponds to a different frequency bin and for each frequency bin signal mapper 12 selects a symbol from a constellation of points. Signal mapper 12 chooses the constellation for each frequency bin based on the channel quality for the frequency bin. The channel quality is typically determined by probing the channel during a training sequence. The size of the constellation, and hence the number of input data bits that can be represented by the symbol chosen from the constellation, is dependent upon the quality of the channel in the frequency range of the bin. A channel having better quality can use a denser constellation with more points and therefore more bits can be transmitted with each symbol. Thus, the number of input data symbols represented by a block of symbols is dependent upon the quality of the channel.
As an example, in a 32-point DMT system the output of the signal mapper 12 is X0-X31. However for asymmetrical digital subscriber line (ADSL) systems using DMT, there are no symbols transmitted in the zero (X0) and Nyquist (X16) frequency bins. There are symbols transmitted in the lower fifteen complex frequency bins (XrX15) and the upper fifteen complex frequency bins (X17-X31) are selected as the complex conjugate images of the lower fifteen bins so that the resulting frequency-domain signal possesses the Hermitian symmetry needed to make the time-domain signal real-valued.
Inverse Discrete Fourier Transform (IDFT) device 14 receives each block or vector of frequency-domain symbols X, X0-XN-ι. and transforms them into blocks or vectors of time-domain symbols x, x0-xN-1, which are provided to perturbation selector 16. IDFT device 14 and perturbation selector 16 together form perturbation transform device 17. In other applications different types of invertible transform devices may be used and the outputs of the IDFT and the other invertible transform devices may generally be referred to as the transform- domain symbols. Perturbation selector 16 perturbs the time-domain symbols, as described in detail below, in order to reduce the PAR (or, more generally, improve a defined property) of the transmitted symbols and outputs blocks or vectors of perturbed or modified time-domain symbols y, y0-yN.ι- Perturbed or modified time-domain symbols y are provided to parallel to serial converter 18 and these symbols are transmitted in serial form over the channel to receiver 19.
It should be noted that although perturbation selector 16 perturbs the time-domain symbols, or more generally the transform-domain symbols, this is not a necessary limitation of this invention. As shown in FIG. 1 B, transmitter 10' has a perturbation selector 16' which perturbs the symbols prior to IDFT device 14, i.e. in this example, the frequency-domain symbols would be modified instead of the time-domain symbols. Perturbation selector 16' and IDFT 14 together form perturbation transform device 17'. As described above, the prior art techniques for reducing PAR do so by either placing values in "unused" frequency bins and/or complex frequency bins which transmit data. In some cases the channel quality may be so poor in some frequency bins that several complex frequency bins in addition to the DC and Nyquist bins are not used to transmit data. However, in many practical cases the number of complex frequency bins that can not transmit data is small or zero. Therefore, these prior art schemes generally use complex frequency bins that could have transmitted data to reduce PAR. Thus, these schemes often exhibit a significant data rate loss. Perturbation selector 16, according to this invention, uses the complex data carrying frequency bins to reduce PAR without affecting the data rate using a technique referred to herein as modulo Mk perturbation and additionally uses the unused frequency bins (DC, Nyquist and N/4) in novel ways to further reduce PAR. Of course, the PAR reduction techniques described in this specific DMT example are directly applicable to improve other defined properties in a transform-domain signal in DMT systems and systems using other modulation schemes, as will be apparent to those skilled in the art.
Modulo Mk Perturbation With this approach, the signal constellations are expanded relative to the minimum necessary constellation size to support the given data rate in each complex frequency bin and the expanded constellation is partitioned into equivalence classes. The receiver 19, FIGS. 1A and 1 B, is designed to detect equivalence classes (not individual constellation points or symbols). This provides the transmitter some flexibility in choosing the transmitted symbols. This extra degree of freedom can be used to optimize some objective function of the resulting signal— in particular, the time-domain peak amplitude. The objective function is optimized without a reduction in the transmitted bit rate, but the transmit power must be increased to accommodate the additional points in the expanded signal constellations. However, by limiting the size of the expanded constellations as described below, significant PAR reduction can be achieved with almost no increase in the average signal power, so the net performance penalty is negligible.
To illustrate the general idea of an expanded constellation with a specific example, consider a DMT system transmitting at a rate of two bits per frequency bin. Such a specific example, expanded 4-QAM(quadrature amplitude modulation) constellation 20, is depicted in FIG.2. Expanded constellation 20 includes a base constellation 22 (the constellation in the innermost dashed box) containing points A, B, C and D, from which the symbols are chosen by signal mapper 12, FIG.1. Expanded constellation 20 also includes expansion areas 24, 26, 28 and 30 each containing four points labeled A-D. All of the constellation points having the same label, i.e. A, are elements of the same equivalence class and a receiver receiving any one of the points in the equivalence class decodes the point into the same data. As described in detail below, by perturbing one or more of the frequency bins by selecting a point in the equivalence class outside of the base constellation, the time-domain peak value can be reduced.
The following describes how the base constellations may be expanded to form equivalence classes of constellation points. In the frequency-domain, every block of symbols X contains N symbols, (X0-XN-ι). each of which is modulated on a separate carrier frequency. The transmitted time-domain signal vector is given by the inverse Fourier Transform as follows:
xn = -±=∑Xke^/N,n = 0,...,N-l (1) i.e., x=FHX, where F is the Fourier Transform matrix and H denotes Hermitian transpose. To ensure that x is real, X must be chosen to have complex conjugate symmetry, i.e., Xk=X" N.k. where XN=X0, implying that X0 is real, as is XN/2 when N is even.
First consider the complex symbols Xk, k=1 ,2,...,(N/2)-1 , (N/2)+1 N-1.
Generally these complex symbols Xk are chosen from an L2 k-QAM constellation, corresponding to transmitting 2log2Lk bits on complex frequency k. Each L2 k- QAM constellation may altematively described as the Cartesian product of two independent Lk-PAM constellations, one for each real and imaginary component of symbol Xk. A value mk is defined as the largest of the PAM signal magnitudes in the kth channel and dk is the distance between the PAM symbols. A value Mk is equal to 2mk+dk. The value Mk is used to define the equivalence class points in the expanded constellation. In order to define the expanded constellation, the base constellation may be expanded to include for each base constellation point all points that are congruent to each of the base constellation points modulo-Mk in either of the two real and imaginary dimensions. All points congruent modulo-Mk are considered to be in the same equivalence class. See, for example, that one of the points "A" in expansion area 24 outside of the base constellation 22 is +Mk from point "A" in base constellation 22. Also, another point "A" in expansion area 26 is +jMk from point "A" in base constellation 22. The receiver implements a modulo-Mk operation in the real and imaginary components of the kth complex frequency so that any translation of the received symbol by a multiple of Mk in dimension k is transparent to the receiver. It should be noted that other expanded constellations are possible and will be apparent to those skilled in the art.
In theory, each equivalence class could contain an infinite number of points which are multiples of Mk away from the point in the base constellation; however, as described below, it is practical to choose the points that are close (e.g., 1Mk ) to the points in the base constellation to achieve PAR reduction while minimizing the transmitter power requirements.
Alternatively, the base constellation 22 of FIG. 2 may be expanded to constellation 40, FIG. 3. This expanded constellation includes base constellation 42 and expansion areas 44, 46, 48, 50, 52 and 54. Here, in the kth complex frequency bin, valid nonzero perturbations are drawn from the set { M, -M, M/2 + jM, M/2 - jM, -M/2 + jM, -M/2 - jM }, where M = Mk. Effectively this amounts to permitting shifts by elements of the two-dimensional lattice Λ generated by;
M_ 2 0
(2) 2 1 2
The receiver would then be required to operate modulo Λ. A wide variety of similar possible perturbation sets, involving other sublattices of the integer lattice in one, two, or more dimensions, are possible. For signal constellations based on other lattices, for example, the hexagonal lattice in two dimensions, still other perturbations sets are appropriate, as will be apparent to persons skilled in the art.
Referring now to FIG. 4, the perturbation selector 16 is shown in more detail to include modulo Mk perturbation device 60, which perturbs the block of time-domain symbols x to form a plurality of blocks of modified symbols zit(z, 0- Z. N..,). There is an unused frequency bin perturbation device 62, which further modifies the blocks of symbols Z; by adding energy to the unused (DC and Nyquist) frequency bins, forming blocks of symbols z '. And, there is a selection device 64, which selects the block of modified symbols z' that has the minimum peak, in the case of PAR reduction, or generally, selects the block of symbols which most improves the defined property. Modulo Mk perturbation device 60 modifies the block of time-domain symbols x by adding to it all valid perturbation vectors V;, (vi 0-vi N..,), forming modified blocks or vectors, z,, of time-domain symbols. As discussed below, the modified blocks or vectors of symbols, z are further modified by unused frequency bin perturbation device to form vectors, z , from which the vector with the minimum peak is chosen and its symbols are transmitted as output symbols y, y0-yN-1. Perturbation selector 16 operates in the time-domain to perturb the symbols, however, it can be readily modified to operate in the frequency- domain for use in transmitter 10' depicted in FIG. 1B. The perturbation vectors are most easily described in the frequency- domain. Any perturbation vector V=(V0-VN.1), such that each Vkis an integer multiple of Mk in the kth dimension, may be added to the block of symbols X, (XQ-XN.T ), as a valid perturbation vector as is done in perturbation selector 16', FIG. 1 B. To preserve the complex conjugate symmetry of the transmitted signal vector, it is further required that Vk=V* N.k, for k=0, 1.- ••> N-1. As noted above, with the implementation of perturbation selector 16, FIG. 4, the perturbation vector is added in the time-domain; therefore, all valid perturbation vectors V, must be transformed from the frequency to the time-domain and added to the blocks of time-domain symbols x. Since the requirement for a valid perturbation vector is that each Vk be an integer multiple of Mk in the kth dimension, there are therefore an infinite number of valid perturbation vectors. By perturbing the frequency-domain symbols X, (Xo-XN-1 ), in this manner, the resulting perturbed or modified symbols are in the same equivalence class as the unmodified symbols X ,(X0- ). When the perturbations are added in the time-domain, if each symbol in the block of perturbed or modified time-domain symbols is transformed to the frequency-domain, they will be in the same equivalence class as the frequency- domain symbols X^XQ-X^ ) which produce the unmodified time-domain symbols x, (x0-xN..,). For many invertible transforms, and in particular for an inverse discrete
Fourier transform with transform size greater than four (4), it is not feasible (or even impossible) to search over all valid vectors, but a search over a limited set of vectors (such as vectors which perturb only one real or imaginary component of one frequency bin by +/-Mk ) can achieve a significant PAR reduction. This involves first perturbing only the real or imaginary component of a single frequency. Each complex frequency perturbation that is defined to be non-zero corresponds to adding a sine wave to the time-domain symbol. The peak of the sine wave is determined by the magnitude of the perturbation which must be an integer multiple of Mk. Since we do not want the perturbation vector to induce additional peaks in the time-domain signal, it has been determined that small perturbations, i.e., +/-Mk, are useful. Searching over a larger set of vectors (such as vectors which perturb two frequency components, either both in one bin or one in two bins) does improve performance but increases the search complexity. For ease of description, we will describe the case where valid perturbation vectors are vectors which perturb only one real or imaginary component of one frequency bin by +/-Mk . The extension to larger sets of perturbation vectors will be readily apparent to those skilled in the art from the following description.
Signal mapper 12 maps input data to a block of (not necessarily optimum) N symbols or class representatives which are chosen from the base constellations, and then modulo Mk perturbation device 60 operates in the transform-domain by searching for the best valid perturbation, where a perturbation is valid if it transforms a given block of symbols to another block of symbols, which are symbol by symbol in the same equivalence class.
With N frequency bins, two of them being unused (zero and Nyquist), there are N-2 frequency bins which can be perturbed. Each frequency bin can be perturbed by one of four non-zero perturbations, namely, +Mk, -Mk, +jMk and
-jMk, where j= V^T . In the specific case of an inverse DFT, the time-domain signal is real valued only if the frequency-domain signal has Hermitian symmetry. Therefore, only (N-2)/2 "lower" frequency bins are perturbed, with the "upper" image frequency bins chosen as complex conjugate images. Thus, there are a total of 4(N-2)/2=2(N-2) valid non-zero perturbation vectors. Since the zero perturbation vector (i.e., no perturbation of the complex frequency components) is also allowed, there are 2(N-2)+1 valid perturbation vectors.
As is illustrated in FIG. 5, the block of time-domain symbols x,(x0-xN..,), is added to each of the valid perturbation vectors Vj, (v0 through v2,N.2)), to produce vectors z,, (z0 through z 2(N.2)) . The frequency-domain perturbation vector V0 is the all zero perturbation vector. The frequency domain perturbation vector \f is shown, for example, to include a +Mk perturbation of real component of the k=1 frequency bin and the same perturbation of the complex conjugate frequency bin k=N-1. And, frequency-domain perturbation vector V2 is shown to include, for example, a +jMk perturbation of imaginary component of the k=1 frequency bin and a - jMk perturbation of imaginary component of the complex conjugate frequency bin k=N-1. Of course, the frequency-domain perturbation vectors must be transformed into a time-domain perturbation vector v, before being added to the time-domain symbols x.
The Inverse Discrete Fourier transform, v„ of these 2(N-2) vectors (and the all zero vector) V( may, for example, be stored in memory and used to perturb the time-domain symbols x as illustrated in flow diagram 70, FIG. 6. In step 72 the next block of time-domain symbols x is obtained from IDFT device 14, FIG. 1, and in step 74 x is added to vector v( to form z,. In step 76, zt is provided to unused frequency bin perturbation device 62, FIG. 4. In step 78, i becomes i+1 and in step 80 it is determined if i is greater than 2(N-2)+1 , i.e., have all 2(N-2)+1 vectors (including the all zero vector) been added to the present block of symbols x. If not, then the flow proceeds to step 74 where x is added to the next perturbation vector v,. If i is greater than 2(N-2)+1 , then in step 82 i is set to zero and flow returns to step 72 where the next block of symbols is obtained. It must be noted that the each block of time-domain symbols z, is provided to the unused frequency bin perturbation device 62, FIG. 4.
PAR reduction performance is expected to increase as the search space is enlarged. For example, where up to two non-zero components are allowed in the perturbation vector V,. This requires searching over an additional (N-2) * (N- 3) possible vectors. Although searching over this larger space provides a greater time-domain peak reduction, performance improvement may not be significant enough to warrant the tremendous increase in complexity. For larger values of N, (e.g. 256), it may be useful to allow perturbations of +/- 2Mk or larger multiples of Mk as well.
Unused Frequency Bin Perturbation
The idea of reducing the peak by transmitting energy in unused bins is not new, however, novel low complexity methods to use certain unused frequency bins to optimally minimize the peak power are described herein. The methods apply to the following unused frequency bins: the DC bin; the DC and Nyquist bins; the Nyquist bin; and the DC, Nyquist and N/4 bins. Typically during a training sequence, the transmitter will determine which of the frequency bins will be the unused bins. Then, using one of the techniques described below corresponding to the unused bins, each of the vectors z from modulo Mk perturbation device 60 is modified by unused frequency bin perturbation device 62 and the modified vectors Zj' are provided to modified
π symbol selection device 64 where the modified vector z with the smallest peak is chosen and transmitted as symbols y0-y N.
DC bin This technique can be used when the DC frequency bin is unused.
Shifting each symbol ZQ-Z^ in each time-domain vector z, (z„-zN-1) by an equal amount is equivalent to changing only the DC component of the corresponding frequency-domain vector Zs. The peak of each zf (z0-zN-1 ) is reduced by adding to each component z0-zN_., : r- ^ . - ( ax(z ,) + m(z ,) .„. Dcperturbatιon= — — (3) v 2 J where the max and the min are the maximum and minimum values of the symbols z0-zN.., in the time-domain vector z,. The resulting vector is denoted z,'.
DC and Nyquist Bins This technique can be used when the DC and Nyquist bins are unused.
Shifting the even symbols of z; by one value and shifting the odd symbols of z-t by another value is equivalent to changing the values of both the DC and Nyquist frequency components of corresponding frequency-domain vector Zr The even symbols are defined as any component z, of the vector z for which i is even and the odd symbols are defined as any component z, of the vector z for which i is odd. The time-domain peak of z, is reduced by adding to the odd symbols of z,:
Odd perturbation= - (™*^('J + ™.«(*,)) (4)
and adding to the even symbols of z(:
Even perturbation= - (max^) ÷ -(*,)) (5)
where maxotω and minodd are the maximum and minimum values of the odd symbols of time-domain vector z, and maxeven and minever are the maximum and minimum values of the even symbols of time-domain vector z The resulting vector is denoted z '.
Nyquist bin
12 In some systems, energy can not be transmitted on the DC frequency because the transformer in the transmitter is DC blocking. A shift in DC level prior to the DAC in the transmitter can still be beneficial to avoid clipping at the DAC, however, this level is then "filtered out" through the transformer. Thus, if we are interested in reducing PAR at points beyond the transformer, the DC frequency will not be effective. Fortunately, however, using the Nyquist frequency can provide the same level of improvement as the DC frequency, albeit with a slightly more complicated algorithm:
First the odd time symbols z, z3,..., zN.„ of z, are multiplied by -1. The even time symbols are not changed. Denote this vector Uj. These resulting symbols, both even and odd time symbols, are shifted by
max(w, ) + min(w W
DC shift= - (6) J
where max and min are the maximum and minimum values of ,.
The odd symbols of these shifted symbols are again multiplied by -1. The resulting vector is denoted z'
DC, Nyquist and N/4 bins If the transmitter is also not using the N/4 frequency bins in addition to the DC and Nyquist frequency bins, then every fourth symbol zn (n mod 4≡k, for each k=0,1 ,2,3) can be modified independently. Symbols z0, z4, z8 etc. of vector z, are shifted by k=0 pertubation= - (max» 0d =o(^) + min>,mod4=0(z))) ^ (?)
where the min and max are the minimum and maximum of symbols zn of vector Zj such that n mod 4 = 0. Symbols zΛ, z5, z9 etc. of vector z, are shifted by k=1 pertubation= - (max»π,od4=, (^) + min„mod4=, (z,)) ^ (g)
where the min and max are the minimum and maximum of symbols zn of vector Zj such that n mod 4 = 1. Symbols z2, z6, z10 etc. of vector z, are shifted by k=2 pertubation= - (max»mod4WW + min„mod4WW) _ (9)
where the min and max are the minimum and maximum of symbols zn of vector Zj such that n mod 4 = 2. Symbols z3, z7, z etc. of vector z, are shifted by
13 k=3 pertubation= ∞∞^WW + min^^CW) ^ (1Q)
where the min and max are the minimum and maximum of symbols zn of vector z, such that n mod 4 = 3.
The above approaches are now discussed in the frequency-domain. The frequency-domain vectors Z, are modified to produce Zj'.
DC bin
First consider using only the DC frequency bin. Zj' is equal to Z, modified by Z0\
Setting Z0'=V0 in the frequency-domain causes the constant vector (V0 V0 V0) / N t0 De added to the N-point time-domain signal, which has the effect of raising or lowering equally each time-domain symbol. Thus, to minimize the peak sample power, the DC value is chosen to balance the maximum and minimum values of the time-domain symbol, i.e.,
Z0' = - > /2 * (max(Zj) + min(z,)) (11)
where max and min are the maximum and minimum values of the time-domain vector Zj.
DC and Nyquist bin This algorithm uses both the DC and Nyquist bins. Zj' is equal to Z-, modified by Z0' and ZN/2'. Setting the Nyquist frequency bin ZN/2'=VN/2 in the frequency-domain causes the alternating vector (VN/2 , - VN/2 ,... , VN/2 , - VN/2 )/
JN to be added to the N-point time-domain vector, z,. If, in addition, the DC bin Z0'=V0, then the overall perturbation in the nth time-domain symbol is zn'=zn + ( V0 + (-1)nVN/2)/ Λ/r /γ . Since V0and VN/2can be chosen arbitrarily, this freedom allows us to shift the even and odd time-domain samples independently, by choosing
Z0'+ZN/2'= -(maxeven(Zj) + mineven(Zj))* ^ (12) and
ZO'-ZN/Z' = -(maxodd(Zj) + minodd(Zj)* WT , (13)
14 where max, and minotW are the maximum and minimum values of the odd symbols of time-domain vector z, and ma even and mineveπ are the maximum and minimum values of the even symbols of time-domain vector Zj
5 Nyquist bin
If the DC bin can not be used, but the Nyquist bin is available, then Zj' should be equal to Zj modified by ZN/2as described below:
1. Determine the location, I, of the peak (I =arg maxn (|zn|) ) of the time- [0 domain symbol z„ (z0-zN..,) Denote the peak value by p=z, and its sign by s(s=1 if p >0, s=-1 if p < 0); and
2. Let
Z N/2 - (-1)l+1 * (p-s*max[maxnslmod2(-s*zn), maxns(l+1)mod2(s*zn)])/2 * VN . (14)
DC , Nyquist and N/4 bins
If the DC, Nyquist and N/4 bins can all be used to reduce PAR, the 0 corresponding frequency-domain perturbation of 0, N/2 and N/4 can be determined following the idea used to determine DC and Nyquist bin algorithm described above. Alternative Search Methods
The search method described above with regard to FIG. 6 involves 5 searching all 2(N-2)+1 perturbation vectors v, in the modulo Mk perturbation device 60 to determine which most reduces PAR or most improves the defined property of the transform-domain signal. Described below, there are two alternative search methods which reduce the complexity of the search for the perturbation vector which most reduces PAR or most improves the defined
30 property of the transform-domain signal. Other search methods will be apparent to those skilled in the art.
With the first method, illustrated in flow diagram 90, FIG. 7, the next block or vector x of time-domain symbols is obtained, step 92. The peak value for the symbols x0-x N.1 ( peak(x), in time-domain symbol vector x is determined and the
35 peak time sample location, I, is also determined, step 94. Then, a limited set of all nonzero 2(N-2) perturbation vectors Vj is established. That set of vectors, Vj', includes each of the N-2 perturbation vectors corresponding to +Mk, +jMk. The
15 remaining vectors N-2 perturbation vectors are simply negatives of these N-2 perturbation vectors Vj'. The vector z0= x corresponding to the zero perturbation is provided to the unused frequency bin perturbation device 62, FIG 4, in step 96 and in step 98 j becomes j+1. The vector Vj' is compared to x and it is determined if the sign of the vector v,' at location I is equal to the sign of the peak(x), step 100. If it is, then at step 102 that vector is subtracted from x, thereby forming z> which is provided to unused frequency bin perturbation device 62, FIG. 4. In step 104, j becomes j+1 and in step 106 i becomes i+1. In step 108 it is determined if i is greater than N-2. If it is, this indicates all N-2 nonzero vectors (and the all zero vector) have been considered and flow proceeds to step 110 where i and j are set to zero and then the next block or vector x of time-domain symbols is obtained.
If in step 100 it is determined that the sign of the vector at location I is not equal to the sign of the peak(x), then in step 112 it is determined if the sign of the vector Vj at location I is the opposite sign of the sign of the peak(x). If it is, then that vector is added to x in step 114, thereby forming z, which is provided to unused frequency bin perturbation device 62, FIG. 4. In step 104 j becomes j+1 and in step 106 i becomes i+1. And, as described above, in step 108 it is determined if i is greater than N-2. If it is, this indicates all N-2 nonzero vectors (and the all zero vector) have been considered and flow proceeds to step 110 where i is reset to zero and then the next block or vector x of time-domain symbols is obtained. If in step 112 it is determined that the sign of vector v, at location I is not the opposite sign as the sign of the peak (x), then the system moves to step 106 where i becomes i + 1 and flow proceeds as described above.
Therefore, with this search method less than half of the perturbation vectors must be used as compared to the method described above with regard to FIG. 6. Another alternative search method is depicted in FIGS. 8-10. This method successively reduces the search space by eliminating perturbation vectors which do not sufficiently reduce the peak at each time sample.
As shown in FIG. 8, we establish and store in memory a set 120, FIG. 9, of perturbation vectors. The set includes 2(N-2)+1 time-domain perturbation vectors if we allow one real or imaginary component of one frequency bin to be perturbed by +/-Mk and include the all zero perturbation vector. The vectors each include N components corresponding to the number of time symbols. Each component in the vectors may be represented as v,,, where i indicates the
16 vector and j is the component in the vector. If all the Mk are the same, each component of the vectors takes on one of N/2+1 possible values from -2M/VN to 2M/VΪV . These values are ordered from smallest to largest and are referred to as vals(l), where 1=0,1 ,2..., N/2. Then, a three-dimensional table 130, FIG. 9, is generated and stored.
The time index, j (j=0 through N-1), is the first dimension in the table and I =0 through N/2 is the second dimension in the table. The third dimension is a set of vectors one corresponding to each time index j and each of the N/2+1 I's, where the ith component of the corresponding 2(N-2)+1 point vector is a one if v,j in set 120 is greater than vals(l). Otherwise, the value of the ith component of the 2(N-2)+1 point vector is a zero. This three dimensional table is used in the perturbation vector search algorithm, described below.
First a threshold, T, is defined which is the maximum allowable peak after the modulo Mk perturbation. Since the unused frequency bin perturbation device further reduces the peak, this is not necessarily the maximum allowable peak of the system. The threshold, T, is system dependent and is chosen to be some value to which it is desired to reduce the peak. Another value, A, which is the maximum perturbation, is set equal to 2M/ N . With a +/-Mk perturbation in one real or imaginary component of one frequency bin, this is the largest perturbation in a time-domain sample generated. Then, a vector goodT is defined. This vector initially has each of its 2(N-2)+1 components set to one, [1 ,1 ,..., 1]. The components correspond to the 2(N-2)+1 perturbation vectors of the set of vectors 120, FIG. 8, and a one indicates that the corresponding vector is a "good" vector and should be considered for reducing PAR, while a zero indicates that the vector is not a good candidate and should not be considered.
The flow diagram 140, FIG. 10, describes how the vector goodT is established for each block of time-domain symbols x (x0-xN.ι) obtained, step 142. In step 144, the time index, j, is set to zero. In step 146 it is determined if | j | ≤ |T-A|, where x, is the jth component of the time-domain symbol block x. If it is, indicating that none of the perturbation vectors will cause |xj to exceed the threshold, the system proceeds to step 148. In step 148, the time index, j, is incremented to the next time sample and in step 150 it is determined if j>N-1. If it is, this indicates that all of the symbols in block x have been considered. In step 152, from the vector goodT the "good" vectors, or some subset thereof, are used to produce the blocks of modified symbols Zj which are provided to
17 unused frequency bin perturbation device 62, FIG. 4. That is, block x is added to each perturbation vector that is a good candidate, as indicated by vector goodT, to form blocks of modified symbols Zj . Then, the flow proceeds to step 142 where the next block of symbols x is obtained. If it is determined that j is not greater than N-1 in step 150, flow loops back to step 146.
If it is determined in step 146 that | Xj | is not less than or equal to |T-A|, then in step 154 it is determined if |X -T| < A. If it is, then in step 156 the vector goodT becomes goodT NAND table[j][pertindex1], where table[j][pertindex1] is an index to one of the 2(N-2)+1 point vectors in three dimensional table 130, FIG. 9. The index j indicates time, e.g., 0, 1...N-1 , and pertindexl , calculated as described below, indicates which of the set of N/2+1 vectors corresponding to time index j the vector is to be chosen. A value for pertindexl is calculated by first determining a value for maxp as follows:
maxp= T-Xj (15)
where maxp is the maximum allowable perturbation at time j. Then, pertindexl is calculated as follows:
pertindexl = ceil \ — cos \maxp) (16)
2M
where the inverse cosine may be determined by using a stored lookup table and "ceil" corresponds to rounding up to the nearest integer. Pertindexl could also alternatively be determined from maxp directly using a stored lookup table. After goodT has been set in step 156, the time index j is incremented in step 148 and flow proceeds as described above.
If in step 154 it is determined that |xrT| is not less than or equal to A, then in step 158 it is determined if | Xj+T| is less than or equal to A. If it is, then in step 160 the vector goodT becomes goodT AND table[j][pertindex2], where table[j][pertindex2] is an index to one of the 2(N-2)+1 point vectors in three dimensional table 130, FIG. 9. The index j indicates time, e.g., 0, 1...N-1 , and pertindex2, calculated as described below, indicates which of the set of N/2+1 vectors corresponding to time index j the vector is to be chosen. A value for pertindex2 is calculated by first determining a value for minp as follows:
minp= -T-x(j) (17)
18 where minp is the minimum allowable perturbation at time j. Then, pertindex2 is calculated as follows:
pertindex2= ceil \ — cos-1 (min p) (18)
2π 2M
where the inverse cosine may be determined by using a stored lookup table and "ceil" corresponds to rounding up to the nearest integer. Pertindex2 could also alternatively be determined from minp directly by using a stored lookup table. After goodT has been set in step 160, the time index j is incremented in step 148 and flow proceeds as described above.
If in step 158 it is determined that | x,+T| is not less than or equal to A, then in step 162 each of the 2(N-2)+1 components of goodT is set to zero, [0,0 0], indicating that none of the perturbation vectors can sufficiently reduce the peak. Then, the system loops back to step 142 where the next block of time-domain symbols x is obtained. Or, the threshold, T, may be raised and the system may restart at step 144.
After all x, values in each block of time-domain symbols x have been considered, the vector goodT is evaluated. A one in any component of that vector indicates that the corresponding vector in the set of vectors 120, FIG. 8, is a good candidate for a perturbation vector. Then, there are several options. The first involves choosing any one of the good vectors, adding it to the present block of symbols x to form a block of modified symbols and providing the block of modified symbols to the unused frequency bin perturbation device. Another option involves adding each of the good vectors to the present block of symbols x to form blocks of modified symbols and providing the blocks of modified symbols to the unused frequency bin perturbation device. Yet another option involves adding some specified number of the good vectors to the present block of symbols x to form blocks of modified symbols and providing the blocks of modified symbols to the unused frequency bin perturbation device.
The first option reduces complexity but also reduces performance to a certain degree. With the second option and an appropriately chosen threshold, T, performance loss should be minimal, but complexity reduction is not as significant as option 1. With option 3, the balance between performance and complexity reduction falls between options 1 and 2.
19 It should be noted that table 130, FIG. 9, must be modified if all the Mk's are not equal. Two options for modifying table 130 are described below.
In the first option, define M=maxk Mk, i.e. the maximum of all the Mk's. Then assume each base constellation is expanded modulo-M. Table 130 will remain the same except that it will be based on the value of M defined above. In other words, A and vals(l) where I =0,1 ,2, ..., N/2 are determined using this value of M.
In the second option, table 130 is generated assuming that the kth base constellation is expanded modulo-Mk and that different values of Mk are possible for different frequency bins k. This implies that the time sample values of the valid perturbation vectors can take on more than N/2+1 values. Let maxval and minval denote the maximum and minimum values that the components of the valid perturbation vectors take on. Equivalent^, maxval will be equal to
maxval= 2 max- - (17)
* N
and minval= -maxval. Then define vals(l) as the values minval to maxval spaced by a desired granularity, where I goes from 0 to L, where L =
(maxval+minval)/granularity +1. Note the first dimension of the table now has
L+1 entries instead of N/2+1. Therefore, the table size may be larger.
Pertindexl is now calculated as Pertindexl = floor( (maxp - minval)/granularity) where floor corresponds to rounding down to the nearest integer and Pertindex2 is calculated as Pertindex2 = ceil((minp-minval)/granularity) where ceil corresponds to rounding up to the nearest integer. The rest of the table generation and the use of the table is the same.
Receiver In FIG. 11 there is shown a schematic block diagram of receiver 19 depicted in FIGS. 1A and 1 B. The modified symbols y, after going through the channel, are received as symbols w at receiver 19. Receiver 19 includes a serial to parallel converter 170 which receives the time-domain symbols w in serial form and converts them to blocks of received time-domain symbols w, w0- wN.,. The blocks of received time-domain symbols w, w0-wN..,, are provided to Discrete Fourier Transform device 172 which converts the time domain symbols
20 into blocks of received frequency-domain symbols W, W0-WN..,. The blocks of received frequency-domain symbols W, W0-WN_., are provided to Frequency domain equalizer device 174 which takes into account the effect of the channel on the transmitted modified frequency domain symbols Y, Y0-YN-ι. and scales the received symbols W, W0-WN..,, to produce symbols Y', Y'0-YVι which are estimates of the transmitted symbols Y.Yo-Y^. The estimates of the transmitted symbols are provided to inverse signal mapper 176 which converts the estimates of the transmitted modified frequency domain symbols Y', Y'0-Y'N-I, into output bits 178 corresponding to the input bits provided to transmitters 10 and 10' of FIGS. 1 A and 1 B, respectively.
Inverse signal mapper 176 is designed to detect equivalence classes (not individual constellation points or symbols) or it is said to operate modulo equivalence classes. The symbols Y', Y'0-YVι. correspond to estimates of the frequency-domain points selected from e.g., expanded constellation 20, FIG. 2, however, they may not be equal to those constellation points due to noise on the channel. Thus, inverse signal mapper 176 must account for this channel noise when inverse mapping the symbols to output bits 178. For example, the inverse signal mapper may first map each of the symbols Y'0-Y'N-I to the nearest point in the expanded constellation and then map this expanded constellation point to the equivalent point in the base constellation. Other possible implementations of the inverse signal mapper will be clear to those skilled in the art.
Alternative Perturbation Selectors In alternative perturbation selector 16a, Fig 12, the modulo-Mk perturbation is applied to the input symbols b times. The number of times that the modulo-Mk perturbation should be applied will be dependent on block size N and desired system complexity. Each iteration (i.e. each time the modulo-Mk perturbation is applied), the peak of the time domain symbol is reduced. The reduction will decrease to zero after several iterations.
Perturbation selector 16a is provided time-domain symbol x (x0-xN-ι)- In theyth iteration, modulo-Mk perturbation device 180 receives time domain symbol x , where x0 = x. Modulo-Mk perturbation device modifies the block of time-domain symbols x, by adding to it all valid perturbation vectors Vj, forming modified blocks z i. Modified symbols selection device 182 chooses the modified block zu that has minimum peak value and outputs this to the next
21 stage modulo-Mk perturbation device 180 where the valid perturbation vectors Vj are added to it.
Perturbation selector 16b, Fig 13, is very similar to perturbation Selector 16a. The only difference is that before being passed to the first stage modulo- Mk perturbation device 180, the input symbol x is provided to unused frequency bin perturbation device 190 which chooses the unused frequency bin perturbations to minimize the peak value of x. Oftentimes, applying the unused frequency bin perturbation device prior to the modulo-Mk perturbations will allow the peak value to be reduced more quickly in the first few stages. However, it may also lead to a slightly higher peak value after several stages. In other words, after a sufficient number of stages perturbation Selector 16a may produce a symbol with lower peak value than perturbation Selector 16b.
A number of alternative perturbation selectors are shown in FIGS. 15-18. These alternative perturbation selectors apply several iterations of perturbations derived from a reduced complexity perturbation vector search which is illustrated in flow diagram 200, FIG 14. The operation of flow diagram 200, steps 202-220, is essentially the same as that of flow diagram 140, FIG. 10, and is therefore not described again. At a given iteration, if the reduced complexity perturbation search achieves its threshold T, the threshold T is reduced. If the threshold is not achieved, the threshold is raised. If the number of iterations allocated, numloops, have not been completed, the reduced complexity perturbation search is applied to the modified symbols and another perturbation is determined. The thresholds T and the number of iterations, numloops, are system dependent. Note that the amount that T is raised or lowered does not have to be the same at each iteration.
The operation of one alternative perturbation selector is illustrated in flow diagram 230, FIG. 15. In step 232, the next blocks of time-domain symbols x and an initial threshold T are obtained and in step 234 an index k is initialized to zero. In step 236, using the symbol x and threshold T the reduced complexity perturbation search (flow diagram 200, FIG. 14) which determines a set of "good" perturbation vectors, described by goodT, is performed. In step 238 if goodT is non-zero, then in step 240 any one of the "good" vectors, denoted v, is chosen and used to modify x, i.e. x = x + v. Typically, the first good vector is chosen first, i.e. the perturbation vector corresponding to the first "one" in the vector goodT. In step 242 the threshold T is lowered and in step 244 the index k is incremented. It is then determined in step 246 if k < numloops. If it is then the reduced complexity perturbation search is performed again with the
22 modified x. If it is not, the modified symbol y=χ is output in step 248 to parallel to serial converter 18, FIG. 1A. Altematively, if in step 238 goodT is not nonzero, the threshold T is raised in step 250 and index k is incremented in step 244. It is then determined in step 246 it is determined if k < numloops and flow continues as described above.
The operation of another alternative perturbation selector is illustrated in flow diagram 260, steps 262-280. The operation of flow diagram 260 is essentially the same as that of flow diagram 230, FIG. 15 and only differs in the following way. If in step 268 it is determined that goodT is not non-zero, the threshold T is raised in step 280, but the index k is not incremented. Instead, flow proceeds to step 266 where the reduced complexity perturbation search is performed without incrementing the index k. In this implementation the time- domain symbol's peak value is always reduced numloops times. This may lead to a lower peak value. The operation of two additional alternative perturbation selectors are illustrated in flow diagram 290, FIG. 17, steps 292-312 and flow diagram 320, FIG. 18, steps 322-342. The operation of these perturbation selectors is similar to the operation of the selectors of FIGS. 15 and 16, respectively. The only difference is that the input time-domain symbols x, prior to being used in the reduced complexity perturbation search (step 298, FIG. 17 and step 328, FIG. 18) for the first time, are modified by performing an unused frequency bin perturbation (step 294, FIG. 17 and step 324, FIG. 18) which uses the unused frequency bin perturbations to reduce the peak value of x. Then a reduced complexity perturbation search is performed on the modified symbol. It should be noted that this invention may be embodied in software and/or firmware, which may be stored on a computer useable medium, such as a computer disk or memory chip. The invention may also take the form of a computer data signal embodied in a carrier wave, such as when the invention is embodied in software/firmware, which is electrically transmitted, for example, over the Internet.
The present invention may be embodied in other specific forms without departing from the spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range within the equivalency of the claims, are to be embraced within their scope.
23

Claims

What is claimed is:Claims
1. In a transmitter for transmitting data in blocks over a channel to a receiver, a device for improving a defined property of transform-domain symbols, the device, comprising: a signal mapper which maps the input data into blocks of symbols in a first domain; wherein each of the symbols is chosen from a base constellation contained in an expanded constellation having expansion symbols, and wherein at least some of the symbols in the base constellation have one or more corresponding expansion symbols; each base symbol and its corresponding expansion symbols defining an equivalence class of symbols which represent the same data to the receiver; and a perturbation transform device, responsive to the blocks of symbols, which produces for each block of symbols in the first domain a block of perturbed transform-domain symbols in order to improve a defined property of the transform-domain symbols; wherein each symbol in the block of perturbed transform-domain symbols, in the first domain, is in the same equivalence class as each corresponding symbol in the block of symbols.
24
PCT/US1999/007840 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals WO1999053662A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
JP2000544104A JP2002511707A (en) 1998-04-10 1999-04-09 System, apparatus and method for improving the definition characteristics of a transform domain signal
BR9909525-4A BR9909525A (en) 1998-04-10 1999-04-09 Device to improve a defined property of transformation-domain signals
KR1020007011221A KR20010042558A (en) 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals
EP99916577A EP1068706A4 (en) 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals
AU34870/99A AU740189B2 (en) 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals
CA002328145A CA2328145A1 (en) 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US5867198A 1998-04-10 1998-04-10
US09/058,671 1998-04-10
US8717798A 1998-05-29 1998-05-29
US09/087,177 1998-05-29

Publications (1)

Publication Number Publication Date
WO1999053662A1 true WO1999053662A1 (en) 1999-10-21

Family

ID=26737891

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/007840 WO1999053662A1 (en) 1998-04-10 1999-04-09 System, device and method for improving a defined property of transform-domain signals

Country Status (8)

Country Link
EP (1) EP1068706A4 (en)
JP (1) JP2002511707A (en)
KR (1) KR20010042558A (en)
CN (1) CN1300493A (en)
AU (1) AU740189B2 (en)
BR (1) BR9909525A (en)
CA (1) CA2328145A1 (en)
WO (1) WO1999053662A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002093822A1 (en) * 2001-05-17 2002-11-21 Telefonaktiebolaget Lm Ericsson Methods and arrangements relating to a telecommunication system
WO2003019791A2 (en) * 2001-08-23 2003-03-06 Nortel Networks Limited System and method for reducing the peak power in multi-carrier modulation
WO2004054193A2 (en) * 2002-12-09 2004-06-24 Nortel Networks Limited Method and apparatus for scrambling based peak-to-average power ratio reduction without side information
EP1435714A2 (en) * 2002-12-27 2004-07-07 Lg Electronics Inc. Method for retrieving sequences of minimum PAPR in an OFDM communication system
WO2009006121A2 (en) * 2007-06-29 2009-01-08 Qualcomm Incorporated System and method for frequency domain spreading

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2814011B1 (en) * 2000-09-14 2003-10-24 France Telecom OPTIMAL ESTIMATION METHOD OF A PROPAGATION CHANNEL BASED ONLY ON PILOT SYMBOLS AND CORRESPONDING ESTIMATOR
KR100480775B1 (en) * 2000-11-18 2005-04-06 삼성전자주식회사 Method and apparatus for reducing Peak to Average Ratio for multicarrier transmission system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5479447A (en) * 1993-05-03 1995-12-26 The Board Of Trustees Of The Leland Stanford, Junior University Method and apparatus for adaptive, variable bandwidth, high-speed data transmission of a multicarrier signal over digital subscriber lines

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6301268B1 (en) * 1998-03-10 2001-10-09 Lucent Technologies Inc. Communication method for frequency division multiplexing signalling systems with reduced average power requirements

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5479447A (en) * 1993-05-03 1995-12-26 The Board Of Trustees Of The Leland Stanford, Junior University Method and apparatus for adaptive, variable bandwidth, high-speed data transmission of a multicarrier signal over digital subscriber lines

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MUELLER S H, HUBER J B: "A COMPARISON OF PEAK POWER REDUCTION SCHEMES FOR OFDM", IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE. PHOENIX, ARIZONA, NOV. 3 - 8, 1997, NEW YORK, IEEE., US, vol. 01, 1 November 1997 (1997-11-01), US, pages 01 - 05, XP002921471, ISBN: 978-0-7803-4199-9 *
See also references of EP1068706A4 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002093822A1 (en) * 2001-05-17 2002-11-21 Telefonaktiebolaget Lm Ericsson Methods and arrangements relating to a telecommunication system
US7778341B2 (en) 2001-08-23 2010-08-17 Nortel Networks Limited System and method performing quadrature amplitude modulation by combining co-sets and strongly coded co-set identifiers
WO2003019791A2 (en) * 2001-08-23 2003-03-06 Nortel Networks Limited System and method for reducing the peak power in multi-carrier modulation
WO2003019791A3 (en) * 2001-08-23 2003-07-10 Nortel Networks Ltd System and method for reducing the peak power in multi-carrier modulation
US8526547B2 (en) 2001-08-23 2013-09-03 Apple Inc. System and method performing Quadrature Amplitude Modulation by combining co-sets and strongly coded co-set identifiers
US7151804B2 (en) 2001-08-23 2006-12-19 Nortel Networks Limited System and method for reducing the peak power in multi-carrier modulation
US7318185B2 (en) 2001-08-23 2008-01-08 Nortel Networks Limited Method and apparatus for scrambling based peak-to-average power ratio reduction without side information
US8290078B2 (en) 2001-08-23 2012-10-16 Apple Inc. System and method performing quadrature amplitude modulation by combining co-sets and strongly coded co-set identifiers
KR100896352B1 (en) 2001-08-23 2009-05-08 노오텔 네트웍스 리미티드 System and method for reducing the peak power in multi-carrier modulation
WO2004054193A2 (en) * 2002-12-09 2004-06-24 Nortel Networks Limited Method and apparatus for scrambling based peak-to-average power ratio reduction without side information
WO2004054193A3 (en) * 2002-12-09 2004-07-29 Nortel Networks Ltd Method and apparatus for scrambling based peak-to-average power ratio reduction without side information
EP1435714A3 (en) * 2002-12-27 2006-11-15 Lg Electronics Inc. Method for retrieving sequences of minimum PAPR in an OFDM communication system
EP1435714A2 (en) * 2002-12-27 2004-07-07 Lg Electronics Inc. Method for retrieving sequences of minimum PAPR in an OFDM communication system
WO2009006121A3 (en) * 2007-06-29 2009-06-04 Qualcomm Inc System and method for frequency domain spreading
WO2009006121A2 (en) * 2007-06-29 2009-01-08 Qualcomm Incorporated System and method for frequency domain spreading

Also Published As

Publication number Publication date
BR9909525A (en) 2000-12-12
EP1068706A1 (en) 2001-01-17
EP1068706A4 (en) 2001-09-12
KR20010042558A (en) 2001-05-25
CN1300493A (en) 2001-06-20
CA2328145A1 (en) 1999-10-21
AU740189B2 (en) 2001-11-01
JP2002511707A (en) 2002-04-16
AU3487099A (en) 1999-11-01

Similar Documents

Publication Publication Date Title
JP3999271B2 (en) Reduction of average power-to-peak ratio in multi-carrier modulation systems
US6845082B2 (en) Peak to average power ratio reduction in communication systems
Jeon et al. A low-complexity SLM scheme using additive mapping sequences for PAPR reduction of OFDM signals
US6240141B1 (en) Lower-complexity peak-to-average reduction using intermediate-result subset sign-inversion for DSL
US6925128B2 (en) Method and apparatus for reducing a peak-to-average power ratio in an orthogonal frequency division multiplex signal
Woo et al. PAPR analysis of class-III SLM scheme based on variance of correlation of alternative OFDM signal sequences
EP0942566B1 (en) Reduction of peak to average power ratio in multicarrier systems
KR102269498B1 (en) Method and apparatus for controlling power in multi carrier communication system
CN112291174B (en) Peak-to-average power ratio restraining method applied to medium-voltage carrier communication
TWI410094B (en) Transmitter and the method therefor
Sharif et al. Existence of codes with constant PMEPR and related design
AU740189B2 (en) System, device and method for improving a defined property of transform-domain signals
US7136423B1 (en) Side tones packets injection (STPI) for PAR reduction
AU739896B2 (en) System, device and method for improving a defined property of transform-domain signals
KR100767700B1 (en) Apparatuses for transmitting and receiving OFDM symbol and method for transmitting and receiving OFDM symbol
US7254180B1 (en) Discrete multitone transmission systems
Petersson et al. Analysis of tone selection for PAR reduction
Hadi et al. Discrete framelet transform based OFDM system using N-FRAT mapping over Rayleigh fading channel
Ma The optimization of PAPR reduction in the OFDM-IM system
Rady et al. Joint Sidelobe Suppression and PAPR Reduction Techniques in OFDM-Based Cognitive Radios, A Literature Review
Omer et al. Adaptive hybrid PAPR reduction in OFDM system
Zogakis et al. Application of shaping to discrete multitone modulation
Febryanti et al. PAPR reduction in OFDM system with Wavelet transformation and partial transmit sequence technique
Sari et al. Transform-Domain Signal Processing in Digital Communications
Adhikary et al. Discrete wavelet packet based multitone modulation for transmitting complex symbols

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 99804943.3

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 34870/99

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: IN/PCT/2000/00470/MU

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 1020007011221

Country of ref document: KR

Ref document number: PA/a/2000/009890

Country of ref document: MX

Ref document number: 1999916577

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2328145

Country of ref document: CA

Ref document number: 2328145

Country of ref document: CA

Kind code of ref document: A

Ref document number: 2000 544104

Country of ref document: JP

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 1999916577

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1020007011221

Country of ref document: KR

WWG Wipo information: grant in national office

Ref document number: 34870/99

Country of ref document: AU

WWR Wipo information: refused in national office

Ref document number: 1020007011221

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1999916577

Country of ref document: EP