Professional Documents
Culture Documents
C250 PDF
C250 PDF
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/304415709
CITATIONS READS
0 7
5 authors, including:
Some of the authors of this publication are also working on these related projects:
IEEE PIMRC 2017, Montreal, QC, October 8th-13th, 2017 View project
Robust and Smart M2M Wireless Communications, Remote Control, and Sensing for Enhanced
Automated-Management, Productivity and Safety in Smart Underground Mines View project
All content following this page was uploaded by Sofiène Affes on 04 November 2016.
The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document
and are linked to publications on ResearchGate, letting you access and read them immediately.
Code-Aided Time Synchronization of Turbo-Coded
Square-QAM-Modulated Transmissions: Closed-Form
Cramér-Rao Lower Bounds
Faouzi Bellili, Achref Methenni, Souheib Ben Amor, Sofiène Affes, and Alex Stéphenne
INRS-EMT, 800, de la Gauchetière Ouest, Bureau 6900, Montreal, Qc, H5A 1K6, Canada.
Emails: {bellili, methenni, souheib.ben.amor, affes}@emt.inrs.ca, and stephenne@ieee.org
Abstract—This paper tackles the problem of code-aided (CA) to strike a proper balance between these two extreme cases and
timing recovery in turbo-coded square-QAM transmissions. Owing CA estimation sprang up exactly for this purpose. In this paper,
to a simple recursive construction process, some hidden properties we consider the problem of CA time synchronization from a
of Gray-coded (GC) square-QAM constellations are demystified and
the code bits’ a priori log-likelihood ratios (LLRs) are explicitly incor- “performance bounds” point of view. We typically consider the
porated in the log-likelihood function (LLF). Then, by splitting the stochastic1 CRLB which, unlike many other loose bounds, reflects
underlying LLF into the sum of two analogous terms, we derive for the actual achievable performance in practice. Yet, even under
the very first time the closed-form expressions for the exact Cramér- uncoded transmissions, the complex structure of the LLF makes it
Rao lower bounds (CRLBs) of the underlying turbo synchronization extremely hard, if not impossible, to derive analytical expressions
problem. Computer simulations will show that the new closed-form
CRLBs coincide exactly with their empirical counterparts evaluated for this practical bound, especially with high-order modulations.
previously using exhaustive Monte-Carlo simulations. They will also Therefore, in the specific context of timing recovery, the stochastic
show unambiguously the remarkable performance improvements of CRLBs were previously evaluated using exhaustive Monte-Carlo
the CA scheme against the traditional non-data-aided (NDA) one. simulations (i.e., empirically) in [11] and [10] for both non-
Over a wide range of practical SNRs, the new CA CRLBs reach code-aided (NCA) and CA estimations, respectively. Just recently
those of the completely data-aided (DA) scheme in which all the
transmitted symbols are perfectly known to the receiver. though were their analytical expressions established [12] but only
in the NCA case.
Motivated by these facts, we develop in this paper for the very first
I. I NTRODUCTION time the closed-form expressions of CA TD CRLBs with arbitrary
square-QAM modulations. Compared to their NCA counterparts
N order to provide high quality of service while satisfying
I the ever-increasing demand in high data rates, the use of
powerful error-correcting codes in conjunction with high-spectral-
[11, 12], the new closed-form CA CRLBs confirm that huge
performance gains, in terms of TD estimation, can be indeed
achieved by appropriately exploiting the decoder’s soft outputs
efficiency modulations is advocated. Indeed, turbo codes along
during the estimation process. The closed-from TD CA CRLBs
with high-order quadrature amplitude modulations (QAMs) are
are obtained owing to an elegant decomposition of the system’s
two key features of current and future wireless communication
LLF into the sum of two analoguous terms after exploiting some
standards such as 4G long-term evolution (LTE), LTE-advanced
hidden properties of the the Gray coding process.
(LTE-A) and beyond (LTE-B) [1, 2]. As a crucial task in any
The rest of this paper is structured as follows. In section II,
digital receiver [3], accurate time synchronization remains a
we present the system model. In section III, we introduce the
challenging problem especially for turbo-coded systems since
recursive process that allows the construction of any GC square-
they are intended to operate at very low signal-to-noise ratios
QAM constellation and relate the symbols’ a priori probabilities
(SNRs). In fact, the widespread adoption of turbo codes is in
(APPs) to the a priori LLRs of the code bits. In section IV, we
part fueled by their ability to operate in the near-Shannon limit
derive the LLF of the system and in Section V we establish the
even under such adverse SNR conditions [4]. Yet, the salutary
new closed-form CA CRLBs. In Section VI, we provide and
performance of these powerful error-correcting codes is prone to
discuss some graphical representations of the obtained bounds.
severe degradations if the system is not accurately synchronized
Finally, we draw out some concluding remarks in section VII.
in time, phase or frequency. The goal of time synchronization,
We mention beforehand that some of the common notations will
in particular, consists in estimating and compensating for the
be used in this paper. Vectors and matrices are represented in
unknown time delay (TD) introduced by the channel in an attempt
lower- and upper-case bold fonts, respectively. The operators {.}
to provide the decision device with signal samples of lowest
and {.} return, respectively, the real and imaginary parts of any
possible ISI corruption [3].
complex number. The operators {.}∗ and |.| return its conjugate
Generally speaking, depending on the a priori knowledge about
and its amplitude, respectively, and j is the pure complex number
the transmitted symbols, time delay estimators (TDEs) can be
that verifies j 2 = −1. The Kronecker and Dirac delta functions
categorized into two broad categories: DA and NDA methods
are denoted, respectively, as δm,n and δ(t). We will also denote
assuming, respectively, all the symbols to be perfectly known or
the probability mass function (PMF) for discrete random variables
completely unknown (and thus considered as nuisance param-
(RVs) by P [.] and the pdf for continuous RVs by p[.] The
eters) to the receiver. DA TDEs have the major drawback of
statistical expectation is denoted as E{.} and the notation is
limiting the whole throughput of the system as they require the
used for definitions.
regular transmission of a completely known (i.e., pilot) symbol
sequence. NDA TDEs, however, suffer from severe performance 1 In linearly-modulated transmissions, the term stochastic refers to estimation
degradations under harsh SNR conditions. It is essential then, under the assumption of unknown and random transmitted symbols.
K
We also define the a priori LLR of the lth code bit, bkl , conveyed
x(t) = a(k) h(t − kT ), (1) by x(k) as follows:
k=1
P [bkl = 1]
is transmitted over the communication channel where T and h(t) Ll (k) ln . (8)
are the symbol duration and a unit-energy square-root shaping P [bkl = 0]
pulse, respectively. The transmitted symbols {a(k)}k which are Using (8) and the fact that P [bkl = 0] + P [bkl = 1] = 1, it can be
completely unknown to the receiver are drawn from any M -ary easily shown that:
GC square-QAM constellation whose alphabet is denoted as Cp =
Ll (k)
{c0 , c1 , · · · , cM −1 }. Here, by square QAM
we mean M = 22p P [bkl = b̄m
1 m
e(2b̄l −1) 2 ,
l ]= (9)
i.e., QPSK, 16−QAM, 64−QAM, etc... . The Nyquist pulse g(t) 2 cosh Ll (k)/2
obtained from h(t) is defined as:
+∞ in which b̄m
l is either 0 or 1 depending on which of the symbols
cm is transmitted, at time instant k, and of course on the Gray
g(t) = h(x)h(t + x)dx, (2)
−∞ mapping associated to the constellation in (6). Thus, injecting (9)
and satisfies the first Nyquist criterion [3]: in (7) the symbols’ APPs develop into:
2p
2p
Ll (k)
g(nT ) = 0, for any integer n = 0. 1 m
(3)
P [x(k) = cm ] = e(2b̄l −1) 2 . (10)
At the receiver side, assuming perfect frequency and phase syn- l=1
2 cosh Ll (k)/2 l=1
chronizations, the delayed continuous-time received signal before βk
matched filtering is expressed as:
Next, we describe a simple three-step process that allows the
y(t) = Es x(t − τ ) + w(t), (4) recursive construction of arbitrary GC square-QAM constella-
tions. Owing to this recursive process, some hidden properties
where Es is the transmit signal energy and τ is the unknown
of such constellations will be revealed and carefully handled in
time delay parameter to be estimated. Moreover, w(t) is a
order to rewrite the APPs in a more insightful form allowing
proper complex additive white Gaussian noise (AWGN) with
for LF factorization in the next section. In fact, using any basic
independent real and imaginary parts, each of variance σ 2 (i.e.,
GC QPSK and starting from any given GC 22(p−1) −QAM, it is
with overall noise power N0 = 2σ 2 ). The SNR of the channel is
possible to build another GC 22p −QAM as follows:
also defined as: 2p
• step 1: build the top-right quadrant of the desired 2 −QAM
Es 2(p−1)
ρ . (5) from all the points of the available 2 −QAM. As such,
2σ 2 all the points of the new quadrant are still missing two out of
An integral step in the derivation of CRLBs consists in finding the 2p bits they must represent. This is simply because they
the LLF of the system. This requires an averaging of the unknown were cloned from the given 22(p−1) −QAM whose points
symbols over the constellation alphabet. In completely NDA actually represent 2p − 2 bits only. For the sake of clarity
estimation (or before data detection), no a priori information is and again w.l.o.g, we will assume that these two missing bits
available about the transmitted symbols. Therefore, the latter are always occupy the two least significant positions.
1
usually assumed to be equally likely, i.e., P [a(k) = cm ] = M • step 2: build the remaining empty quadrants i.e., top-left,
for k = 1, 2, · · · , K, ∀ cm ∈ Cp . In CA estimation, however, the
bottom-right, and bottom-left of the desired 22p −QAM by
actual APPs of the symbols must be used in order to enhance symmetries with respect to the y−axis, the x−axis, and the
the estimation performance. Indeed, in the next section, we will center point, respectively. In light of “step 1”, all the points
express these APPs in terms of the a priori LLRs of the individual of the desired constellation are inherently missing two bits
conveyed bits. As will be explained later in Section IV-A, accurate each.
estimates for these LLRs (and in turn the symbols’ APPs) can • step 3: copy the two bits of each quadrant in the basic GC
be obtained in practice from the soft outputs of the two SISO QPSK constellation to all the points that belong to the same
decoders at the convergence of the BCJR algorithm [18]. quadrant in the incomplete 22p −QAM constellation obtained
As mentioned earlier, consider a GC square-QAM constellation in “step 2”.
wherein each point, {cm }M m=1 , of the underlying alphabet is One example that clearly depicts these three steps is shown in
mapped onto a unique sequence of log2 (M ) = 2p bits denoted
Fig. 1 illustrated here in initial transition from 4-QAM to 16-
1 b̄2 · · · b̄l · · · b̄2p . For the sake of clarity, this mapping
here as b̄m m m m
QAM . For the sake of clarity and conciseness, however, and
will be denoted as follows again w.l.o.g, we will from now on consider the GC QPSK
cm ←→ b̄m 1 b̄2 · · · b̄l · · · b̄2p .
m m m
(6) depicted in Fig. 1) as the basic one and will actually use it in
the system is given by (see also 12] for a prior work on NDA
TD CRLBs):
Λ(y|a; τ )
√
= exp σE2 s y(t)x(t−τ )∗ dt − Es
2σ 2 |x(t−τ )|2 dt , (18)
R R
points share the same 2p − 2 most significant bits (MSBs), Since the coded bits are assumed to be statistically independent,
b̄m m m m m
1 b̄2 b̄3 ...b̄2p−3 b̄2p−2 . We use them to define the quantity: the transmitted symbols are also independent thereby leading to:
2p−2
m −1) Ll (k) K
μk,p (cm ) e(2b̄l 2 , ∀ cm ∈ Cp , (11) P a = ci = P a(k) = ci (k) . (22)
l=1 k=1
which verifies: Plugging (19) and (22) in (21), it can be shown that:
I(τ ) 2 "
Fk,2p uk (τ ) 2ρ
where I(τ ) is the Fisher information for the received data: E = 2 Ψk,2p (ρ), (46)
Fk,2p uk (τ ) σ
2
∂ L(y; τ )
I(τ ) = −E . (37) where Ψk,2p (.) in the last equality is given by:
∂τ 2 +∞ 2
βk,2p d2p λk,2p (t, ρ) − t2
Using (35) in (37) and owing to the linearity of the partial Ψk,2p (ρ) = √
π e 4 dt, (47)
derivative and expectation operators, it immediately follows that: −∞ δk,2p (t, ρ)
K with
I(τ ) = k=1 γk,2p (τ ) + γk,2p−1 (τ ) , (38)
p−1
2
(i) 2 2
where λk,2p (t, ρ) = (2i − 1)θk,2p e−[2i−1] dp ρ
γk,2p (τ ) −E ∂ 2 ln Fk,2p uk (τ ) /∂τ 2 , (39) i=1
√ L2p (k)
γk,2p−1 (τ ) −E ∂ 2 ln Fk,2p−1 vk (τ ) /∂τ 2 . (40) × sinh ρ[2i−1]dp t + 2 ,
F (uk (τ )) F 2 (uk (τ ))
Fk,2p (uk (τ )) with
= u̇2k (τ ) k,2p − k,2p
2
+ ü k (τ ) ,
Fk,2p (uk (τ )) Fk,2p (uk (τ )) Fk,2p (uk (τ )) 2
p−1
Lq (k) (i)
ωk,q 2 βk,q cosh θk,q d2p (2i−1)2 , (51)
in which u̇k (τ ) ∂uk (τ )/∂τ and ük (τ ) ∂ 2 uk (τ )/∂τ 2 . 2
i=1
Moreover, using the same rationale as in Appendix C of [12],
it can be easily shown that u̇k (τ ) and uk (τ ) are two independent 2
p−1
Lq (k) (i)
RVs. Thus, by applying the expectation operator to the previous αk,q 2 βk,q sinh 2 θk,q dp (2i − 1). (52)
i=1
equation, we obtain γk,2p (τ ) as follows:
2 Finally, by injecting (48), (46), (50), and (49) back into (45), the
2 Fk,2p (uk (τ )) Fk,2p (uk (τ )) analytical expression of γk,2p (τ ) is obtained in (41) given at the
γk,2p (τ ) = E u̇k (τ ) E 2
−E
Fk,2p (uk (τ )) Fk,2p (uk (τ )) top of the current page. Due to the apparent symmetries between
the distributions of the two RVs uk (τ ) and vk (τ ), the analytical
Fk,2p (uk (τ ))
− E ük (τ ) . (45) expression of γk,2p−1 (τ ) can be directly deduced from the one
Fk,2p (uk (τ ))
of γk,2p (τ ) by easy identifications as given by (42) displayed on
5 details were omitted due to space limitations the top of the next page as well. The closed-form expression for
⎡ K 2 ⎤
# $ K
γk,2p (τ ) = 4ρ2 ωk,2p − Ψk,2p (ρ) ⎣ 2
ωl,2p − αl,2p ġ 2 [l − k]T + αl,2p ġ [l−k]T ⎦
l=1 l=1
− 2ρ Ψk,2p (ρ) g̈ 0 − αk,2p αl,2p g̈ [l − k]T . (41)
l =k
⎡ K 2 ⎤
# $ K
γk,2p−1 (τ ) = 4ρ2 ωk,2p−1 − Ψk,2p−1 (ρ) ⎣ 2
ωl,2p−1 − αl,2p−1 ġ 2 [l − k]T + αl,2p−1 ġ [l−k]T ⎦
l=1 l=1
− 2ρ Ψk,2p−1 (ρ) g̈ 0 + αk,2p−1 αl,2p−1 g̈ [l − k]T . (42)
l =k
the TD CA CRLB is then obtained as the inverse of the Fisher Therefore, by taking the ratio of (58) and (59) and applying the
infromation given by (38), i.e.: natural logarithm, it immediately follows that:
(R)
1 Ll (k) = Υl (k) − Λl (k) ≈ Υl (k) − Λl (k), (60)
CRLB(τ ) = K . (53)
k=1 γk,2p (τ ) + γk,2p−1 (τ ) meaning that the required a priori LLRs of the code bits can
be easily obtained from their steady-state a posteriori LLRs
A. Evaluation of the analytical CA CRLBs and Λl (k) already computed by the soft demapper prior to data
decoding.
In order to compute and plot the new CA CRLBs, one needs to
evaluate the coefficients ωk,q , αk,q , and Ψk,q (ρ) that are involved V. S IMULATION R ESULTS
in the quantities γk,q (τ ) for q = 2p and q = 2p − 1. These
In this section, we provide some graphical representations for
coefficients are, however, functions of the a priori LLRs, Ll (k),
the new TD CA CRLBs for different modulation orders and differ-
as seen from (47), (51) and (52), respectively. In the sequel, we
ent coding rates. The encoder is composed of two identical RSCs
briefly explain how these LLRs can be obtained from the output
concatenated in parallel, having generator polynomials (1,0,1,1)
of the SISO decoders at the convergence of the BCJR algorithm.
and (1,1,0,1), and a systematic rate R0 = 12 each. The output of
First, the matched filter returns a sequence of K symbol-rate
the turbo encoder is punctured in order to achieve the desired code
samples:
T rate R. For the tailing bits, the size of the RSC encoders memory
y(τ ) = y1 (τ ), y2 (τ ), . . . , yK (τ ) , (54) is fixed to 4. We consider a root-raised-cosine (RRC) signal with
rolloff factor α = 0.2. We also consider QPSK and 16-QAM, as
where two representative examples of square-QAM constellations, and
+∞ two different coding rates, namely R = 12 and R = 13 . We begin
yk (τ ) = y(t)h(t − kT − τ )dt = Es a(k) + wk (τ ). (55) by verifying in Figs. 2 and 3 that the new analytical CA CRLBs
−∞
coincide with their empirical counterparts obtained previously in
Then, the soft demapper extracts the so-called bit likelihoods [20]: [10] from exhaustive Monte-Carlo simulations6 . In fact, unlike
our closed-form solution, an extremely large number of noisy
p y(τ )bkl = 1 observations was generated in [10] in order to find an empirical
Λl (k) ln , (56)
p y(τ )bkl = 0 value for the expectation involved in the Fisher information (37).
Hence, our new analytical expression corroborates these previous
for all the code bits and feed them as inputs to the turbo decoder. attempts to evaluate the underlying TD CA CRLBs empirically
By exchanging the so-called extrinsic information between the and allow their immediate evaluation for any square-QAM turbo-
two SISO decoders, the a posteriori LLRs of the code bits: coded signal7 .
As expected, we also see from both figures that the CA CRLBs
P bkl = 1y(τ ) are smaller than their NDA counterparts. This highlights the
Υl (k) = ln . (57)
P bkl = 0y(τ ) performance improvements that can be achieved by a coded
system (over an uncoded one) by exploiting the information about
are updated iteratively according to the turbo principle. We denote the transmitted bits that is obtained from the SISO decoders.
(r)
their values at the rth turbo iteration as Υl (k). After say R turbo Additionally and most prominently, the CA CRLBs decrease
(R)
iterations, a steady state is achieved wherein Υl (k) ≈ Υl (k), rapidly and reach the DA CRLBs which are the best bounds ever
for every l and k, and their signs are used to detect the bits. Yet, one would be able to achieve if all the transmitted symbols were
owing to the well-known bayes’ formula, we have: perfectly known to the receiver, hypothetically.
p y(τ )bkl = 1 P bkl = 1
6 For cross validation purposes, note that during our simulations the steady-state
k
P bl = 1y(τ ) = , (58) a posteriori probabilities of the symbols required by the empirical approach of [10]
p[y(τ )] were computed from their steady-state a priori probabilities using Bayes’ formula.
The latter are obtained as the product of the steady-state a priori probabilities of
and the corresponding conveyed bits which are themselves obtained from the steady-
k p y(τ )bkl = 0 P bkl = 0 state a priori LLRs in (60) using (9).
P bl = 0 y(τ ) = . (59) 7 Note also that our analytical CA CRLBs are averaged over a very small number
p[y(τ )] of realizations (20 in our simulations) in order smoothen the corresponding curves.
NDA CRLB [3] U. Mengali and A. N. D’andrea, Synchronization Techniques for
CA CRLB (emprirical) Digital Receivers, New York: Plenum, 1997.
−2
10
CA CRLB (analytical) [4] C. Berrou, “The ten-year old turbo codes are entering into service”,
R = 1/3 DA CRLB
IEEE J. Commun. Mag., vol. 41, no. 8, pp. 110-116, Aug. 2003.
[5] F. Bellili, A. Methenni, and S. Affes,“Closed-form CRLBs for SNR
R = 1/2 estimation from turbo-coded square-QAM-modulated signals,” in
Proc. of IEEE Globecom, Austin, TX, USA, Dec. 8-12, 2014, pp.
1765-1771.
[6] F. Bellili, A. Methenni, and S. Affes, “Closed-form CRLBs for
CRLB (τ /T )