IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 5, SEPTEMBER 2004

1659

A Family of Self-Normalizing Carrier Lock Detectors and ES =N0 Estimators for M-PSK and Other Phase Modulation Schemes Yair Linn, Member, IEEE, and Nir Peleg

Abstract—A family of carrier lock detectors for M-PSK receivers operating in additive white Gaussian noise channels is suggested. The statistical properties of the lock detectors are derived theoretically using stochastic analysis, and computer simulations are used to validate the results obtained. The derivations yield discovery of two useful attributes of the lock detectors: 1) they are self-normalizing (or in other words signal-level independent) and 2) the channel 0 can be readily ascertained from the lock metric when the receiver is in lock. Furthermore, a particularly simple hardware implementation for the lock metric computation process is found, which allows easy and efficient implementation of its computation within a field programmable gate array (FPGA) or application specified integrated circuit (ASIC). Analysis of the lock detectors’ behavior under imperfect locking conditions is also discussed, and simulation results are presented. An overview is given of the applicability of the lock detectors to several related digital phase modulation schemes. Index Terms—Binary phase-shift keying (BPSK), lock detector, lock metric, M-PSK, phase modulation, phase-shift keying (PSK), quaternary phase-shift keying (QPSK), receiver design, signal-tonoise ratio (SNR), synchronization.

I. INTRODUCTION HEN building coherent M-PSK receivers, there is an invariable need to generate a reliable carrier lock detection mechanism. Generally, this incurs generating a lock metric, which is compared to a threshold. If that threshold is exceeded, then lock is assumed; otherwise, the receiver is considered to be unlocked. Lock detectors such as those suggested in [1], [6], [8], [10], and [11] operate according to this principle. The prevalent methods for carrier lock detection for M-PSK rely either on nondata aided (NDA) detection based on th-order nonlinearities ([1], [8], [10]) or via decision directed (DD) schemes [8]. However, adrawback of the detectors in the aforementioned references is that the lock detector output is dependent upon the input signal level, and thus the threshold must be so dependent. This regularly overlooked problem often consumes a disproportionate amount of engineering time and energy during receiver design, in order to accommodate the dynamic range of the lock detector and to avoid false locking or false unlocking due to nonideal signal levels or automatic gain control (AGC) performance. Even with an ideal AGC circuit, any change in the AGC’s nominal level must evoke a

W

Manuscript received September 3, 2002; revised March 25, 2003 and July 1, 2003; accepted July 10, 2003. The editor coordinating the review of this paper and approving it for publication is J. Cavers. Y. Linn is with the University of British Columbia, Vancouver BC, V6T-1Z4, Canada (e-mail: [email protected]). N. Peleg is with the Israel Ministry of Defense, Tel Aviv, Israel (e-mail: [email protected]). Digital Object Identifier 10.1109/TWC.2004.833418

corresponding change in the lock detection threshold. In contrast, the lock detectors suggested here are self-normalizing, that is the lock threshold’s value may be set independent of signal level1 or AGC performance. As a useful by-product, the value of the proposed lock metrics, when in lock, will be shown to be a reliable indicator of , which is another important metric in rethe channel ceiver operation. Frequently, a downstream decoder can make estimate for modifying its own internal metuse of an rics in order increase its coding gain (e.g., turbo codes [20] or diversity reception [5]). Alternatively, the use of adaptive coding schemes, where the coding and/or data rate is altered according , presupposes the availability of a reliable to the channel estimate. What is appealing about the proand timely posed metrics is that they provide just such an estimate based only on the sampled baseband input signal (sampled at a rate of one sample per symbol and that sample corresponds to the symbol strobe), necessitate a relatively small number of samples in order to arrive at an accurate estimate, and are irrespective of the data sequence. This obviates the need to estimate the from the pre- or postdecoder symbol or bit error channel rate of the received sequence, as is often done. Finally, the lock detectors presented will also be shown to have an extremely simple hardware implementation that requires only a single, compact lookup table and use of summation as the only mathematical operation. This greatly facilitates the implementation of the proposed structure within receivers that use field programmable gate arrays (FPGAs) or application specific integrated circuits (ASICs). Additionally, the same lock detector behavior, including self-normalizing qualities, estimation, and ease of hardware ability to perform implementation, will be shown to apply to various other related phase modulation schemes. With regard to the layout of this paper, the structure is as follows. Section II presents an overview of the general structure of the receiver and signal around which the discussion applies. Section III engages in rigorous statistical characterization of the lock metric in an additive white Gaussian noise (AWGN) channel, assuming perfect (i.e., jitter-free) carrier and symbol synchronization. That section further outlines the lock detector’s hardware implementation and discusses estimation from the lock metric value, and it culminates in a 1The term signal level as it is used in this paper must not be confused with the term E =N ratio. The former refers to the total signal noise power that is present at the inputs of the samplers in Fig. 1, while the latter refers to the signal-tonoise ratio of that signal.

1536-1276/04$20.00 © 2004 IEEE

+

1660

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 5, SEPTEMBER 2004

Fig. 1. Simplified M-PSK receiver schematic.

section that aims to provide the reader with an intuitive insight into the lock metric’s behavior. Section IV analyzes the lock detector’s performance when imperfect locking is present, providing a detailed quantitative treatment for the case of carrier synchronization phase jitter. Section V provides design formulas for determining the lock detector parameters that will result in desired lock detection probabilities and false alarm rates. Section VI briefly discusses applicability of the lock metric to various special cases of M-PSK signals. Finally, Section VII generalizes the analysis, heretofore done regarding M-PSK signals, to PAM-PSK constellations. II. SIGNAL AND RECEIVER MODELS As previously indicated, we shall first endeavor to deal with M-PSK signals and receivers, generalizing this analysis for PAM-PSK signals in Section VII. While the signal constellations of M-PSK and PAM-PSK differ (and this difference shall be addressed in Section VII), the general receiver structure is identical and is thus applicable to Section VII. We denote the M-PSK data signal as , where:

(1) is the baseband data pulse. The modis the actual data and ulated signal is and that signal is corrupted by an AWGN channel. An M-PSK coherent receiver has the general structure which is shown in Fig. 1, where is the both the symbol rate and the sample rate. 1) 2) where is the width of the bandpass IF filter before the I-Q demodulator (not shown).

represents the total (arbitrary) physical gain associated with the circuit. is in general a slow function of time, controlled by the AGC to achieve a desired signal level at the inputs of the and samplers so that they are not saturated yet their full dynamic range is utilized. While arbitrary, is assumed the same in both the and arms (i.e., they are assumed “matched” to each other). is the frequency difference between the local and re4) ceived carriers, and is the phase of the local carrier. When the carrier loop is ideally locked, we have and (M-PSK carrier synchronization has an inherent -fold ambiguity (see [5])). is assumed ideal, and sampling 5) The matched filter of its output is considered to be at the ideal time (i.e., the symbol synchronization loop is assumed locked). The and the corresponding matched filter pulse shape are assumed to be such that the post-matched filter waveforms conform to the Nyquist criterion for zero ISI [5]. When in this paper the terms “signal-level dependence” are referenced, the meaning pertains to dependence on . Since is arbitrary and multiplies both the signal and noise, it is clear that any dependence of the lock detector characteristics or threshold on is a mathematical appendage, as well as a practical one, because it introduces (and its dynamic range) as a quantity to be reckoned with during the lock detection process. is a function of time controlled by the Furthermore, since implies dependence of the lock AGC, any dependence on detection process on the AGC loop’s temporal behavior, often through a decidedly nonlinear interaction. And yet, with previously available lock detectors such as those presented in [1], [6], [8], [10], and [11], precisely that kind of dependence exists. In contrast, the lock detectors suggested here are (as shall be shown shortly) absent of any association with , and hence 3)

LINN AND PELEG: FAMILY OF SELF-NORMALIZING CARRIER LOCK DETECTORS AND

ESTIMATORS

1661

they and their thresholds are nearly impervious to the AGC’s performance or dynamic range. III. DETECTOR CHARACTERISTICS A. Basic Definitions and Equations The family of lock detectors is defined as

Fig. 2. Efficient hardware generation of ^ l

.

(2) which is of course a finite approximation of (3) where

represents the time average operator defined as

C. Performance Analysis in an AWGN Channel (4)

For

example,

for

(QPSK)

we

bits of the output of the summation). Thus, no mathematical operations except summation are required. This is depicted in Fig. 2. Furthermore, it shall be shortly shown that due to the particular properties of the lock detector, the lookup table can be quite feasibly implemented in hardware.

Elementary rectangular-to-polar manipulations and the use of De Moivre’s theorem [13] yields

have

. We shall also define for future

(7)

(5)

where, if we define [5] (assuming a narrowband bandpass signal, i.e., )

convenience

whereupon we have (6) (8) The proposed lock detector can be thought of as a modification of the th-order nonlinearity detector ([1], [8], [10]). To see this, consider that if the denominator term in (3) is elimi, nated, the latter equation reduces to which is the th-order nonlinearity detector. Generally, one can say that the denominator term in (3) performs adaptive normalization on the numerator; this action has a profound influence on the lock detector’s statistics and implementation and makes it, despite the notational similarity, quite different from the th-order nonlinearity detector. B. Hardware Realization lends itself to efficient hardware implementation. This can be easily seen by looking at (2), (5), and (6); the terms can be generated by a single, fixed-point lookup table which has and as its address, and a single digital integrate-anddump module can perform the summation (the division by is avoided if is chosen to be a power of two, and then the division can be implemented by discarding the lower

we have (Fig. 1)

(9) where (assuming ), we have (10) and (11), as shown at the bottom of the following page. If the carrier loop is locked and assuming perfect coherent and demodulation, we have , and hence

(12) where (13)

1662

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 5, SEPTEMBER 2004

Thus, when locked we have from (11)–(13) that (14) is a noise-perturbed estimate of ). (that is, when locked The rationale behind (2) now immediately becomes apparent

(15) If the carrier loop is unlocked, then the variables are samples of phases of a rotating sinusoid (that sinusoid is noise corrupted and phase modulated, but it is nonetheless rotating). Thus (16) Further justification of (16) will be given in Section III-E. If the carrier loop is locked, then noting that

This is in sharp contrast to other lock detector schemes ([1], [10], [11]), in which the value of the lock detector includes a , and accordingly dominant term that is proportional3 to the lock threshold must be so dependent. Additionally, any attempt to compute those lock detectors must accommodate the , which quite often precludes their impledynamic range of mentation through the use of fixed-point lookup tables in hard’s independence ware. Since is a function of the AGC, also provides significant insulation from false locking from and loss of lock due to nonideal AGC behavior, particularly when dealing with rapidly fading signals. Specifically, instead to within the tight range of of the AGC having to cordon , the AGC now has only to abide by the relatively loose requirements that is such that: 1) no signal-chain or sampler saturation occurs and 2) the samplers are not underdriven to the extent that quantization noise becomes significant. In order to develop quantitative results regarding the depenon the ratio, we note that (when in lock) dence of the process has the distribution as the phase of a Rice random variable with a probability density function (pdf) for ([4], [5], [12], [14])

(17) and denoting

, we have

(18) When locked, the departure of from unity is depen, and for the finite-approximation dent on the channel this also depends on how large is. Thus, it is clear that when the carrier loop is locked provides an estimate of ; a quantitative description of this estimate the channel shall be obtained shortly. Since2 for all and , this implies that the lookup table in Fig. 2 needs only to facilitate representation of fractional numbers, hence making its implementation in hardware quite practical.

x

the infinitesimally probable case of j j = 1 which can always be approximated to any desired tolerance by suitably close fractions. 2Ignoring

(19)

See [4, Sec. 4.5]. Noting that the distributions of the variables are identical (there is no dependence of the pdf on the 3Other lock detector schemes, such as the decision directed schemes suggested in [8], may have a dominant term that is proportional to other powers of (not necessarily ). However, the precise nature of the dependence on is unimportant for the purposes of this paper, as any dependence, whatever its nature, is undesirable.

K

K

K

(10) and

(11)

LINN AND PELEG: FAMILY OF SELF-NORMALIZING CARRIER LOCK DETECTORS AND

ESTIMATORS

1663

actual symbol transmitted) and that these variables are mutually independent, we have assuming ergodicity and using (17)

(20)

, as expressed in (19), Due to the complicated nature of computation of (20) yields results that elude closed-form representations. While (20) is useful in computer simulations and from generation of lookup tables for estimation of the , it is somewhat tedious for use during the design process. Thus, a closed-form simplification is sought for this purpose. To ratios, we have that is that end, if we look at high generally very small (i.e., is nonnegligible only for small ), and thus we can write (using [13, integral 15.72])

Fig. 3.

Lock metric when locked versus E =N .

We can derive an approximation of the . Using units of decibels, we have from (23)

ratio from

(24)

(21) which means that for high

ratios

(22) (see also [12] for a similar derivation) from which it follows that (using [13, integral 15.73])

If we indeed use units of decibels, we have a greatly reduced dynamic range. Combined with the small dynamic range required to describe , this allows (24) to be implemented as a relatively small fixed-point lookup table, hence facilitating within an FPGA or an ASIC. rapid reliable estimation of Note that if increased accuracy is required, the right side of (24) can be replaced with the (numerically obtained) values derived from the lock metric expected value of (20). However, this can likewise be incorporated into a lookup table so no logic comcan plexity penalty is incurred. Thus, estimation of the be achieved using the method described here, using an almost trivial hardware structure, with one sample per symbol (which corresponds to the symbol strobe) and without the need for any symbol decisions to be made. This appears to be quite an improvement over previously available methods, as analyzed in [21]. D. Variance and Distribution of

(23) Fig. 3 shows the value of (obtained through simulation) as well as the values of (20) and (23) as a function of . As seen in that figure, (23) is a good approximathe ratios, which makes it quite a useful tion even for low tool for the designer. Note also that the linear range of the curves corresponds precisely to the most “interesting” range of ratios, i.e., from the minimal ratio where lock can be mainfor the modulation tained [15] to a moderately high in question.

In order to allow for detection probabilities to be evaluated, the variance and distribution of the lock metrics must be ascertained. Recalling (5) and (6), since it has been established that we consequently arrive at the bound

(25) sampling is done at the ideal instants (i.e., the If and symbol synchronization loop is ideally locked), then the symbol components of those samples are mutually independent, which is also true regarding the noise components (due to the matched

1664

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 5, SEPTEMBER 2004

Fig. 4. Received QPSK signal, with E =N = 20 dB and with receiver in lock, K = 0:25, superimposed on contour map of x .

filter). Thus, the variables dependent, hence

may be viewed as mutually in-

symbol is to a valid M-PSK constellation point’s phase. If the carrier is locked (as is the case depicted in Fig. 4), the symbols will be concentrated in clouds around the constellation signal points, which, for QPSK, are on the and axes (on the “1” contour). The location of the center of each cloud is a function of ; however, this does not impact the value of due to the radial symmetry of the contours. It is also intuitively clear that the size of the demodulated signal point clouds will . Thus, when values of be inversely related to the are averaged for many symbols the result will be for infinite , while with decreasing the value of will decrease accordingly, as more symbols depart more significantly from the constellation points’ phases and a bigger proportion of contours of lower values are encountered. If the carrier is unlocked, the phase of the demodulated constellation will rotate due to the incommensurate local and received carriers; consequently, the output of the lookup table will be concentrated on a circular ring around the origin of Fig. 4, with the ring’s radius (i.e., mean distance from the origin) proportional to the signal level and the ring’s width inversely related ratio. The values accrued for many symbols will to the thus (from symmetry considerations) average to zero in the unlocked state; this reasoning provides graphical validation to (16). IV. PERFORMANCE ANALYSIS FOR IMPERFECT LOCKING

(26) Note that since no limiting assumptions were made, (26) is , including a noise-only valid for any input signal at any signal and any carrier synchronization loop. In particular, (26) is valid for any carrier phase jitter conditions; the value of this observation will be apparent in Section V. The distribution of can be considered Gaussian when in lock in lieu of it being a , and this sum of independent equally distributed variables is also true for the unlocked case provided there is no significant frequency error between the local and received carriers. Thus, a good (if conservative) approximation is

If the local carrier exhibits phase jitter, or the sampling of the outputs of the matched filters is not at the ideal instant, this ([9], [10]) though this could also degrades the value of ratio also be modeled as an effective decrease of the [9]. The case of imperfect locking due to carrier phase jitter can be easily modeled by modifying the definition of during lock ). to account for the residual phase error (where The modification is as follows: (28) With this definition we have when locked

(29) (27) For jitter-free locking (as was the case discussed heretofore) is given in (20). If modeling of the effects of the carrier synchronization phase-locked loop’s (PLL) phase jitter is given by (33), as will be is deemed necessary, discussed in Section IV. E. Intuitive Understanding of the Detectors’ Behavior can be intuitively understood by The behavior of looking at a contour graph of . This is shown for the case of QPSK in Fig. 4, where a sample demodulated signal is su. As seen in that figure, for perimposed on a contour map of the corresponding a given demodulated symbol value of is an indication of how close the phase of that

Furthermore, we shall arbitrarily set . This is tantamount to ignoring the carrier synchronization ambiguity, or equivalently rotating the demodulated constellation by , where is an arbitrary integer. This is permissible for a given demodulated due to the fact that the value of symbol is invariant under such a rotation (see Section III-E and Fig. 4 for a graphical illustration of this property). Finally, as a generalization of (17), we note that for any M-PSK constellawhere is an integer we have tion point

(30) That is, the lock detector metric for a given symbol is not dependent upon that symbol but rather only on the phase difference between the received symbol’s phase and the phase of any valid

LINN AND PELEG: FAMILY OF SELF-NORMALIZING CARRIER LOCK DETECTORS AND

ESTIMATORS

1665

M-PSK constellation point. Thus, we can assume for simplicity (which implies ) for all . Under the above simplifications, we can rewrite (29) as (31) A quick glance shows that (31) is of the same form as (14) replaced by . Therefore, if we redefine with (32) then

is still distributed according to (19). Thus

Fig. 5. Equivalent baseband model of the synchronization loop that was used for closed-loop simulations.

(33) where, through comparison with (20), we see that the presence of carrier phase jitter results in the degradation of the lock metric expected value by the multiplicative, less-than-unity factor of . This can be further simplified by using the Taylor expansion of this factor, which yields (using a first order approximation which retains only the first two terms of the Taylor series): (34) and the phase error variance can be evaluated using such methods as those presented in [7]–[10], [15], and [16]. To validate the results of (33) and (34), computer simulations of an equivalent (w.r.t. Fig. 1) baseband system were conducted, with the synchronization loop configured to behave as a second-order phase-locked loop (PLL). This model is shown in Fig. 5. In those simulations, the values of the lock detector were recorded, as was done with the values of the residual phase error . The recorded lock detector values were then compared to those computed using estimates of (33) and (34). The simulation results are shown in Fig. 6 for where is the noise bandwidth4 of the carrier synchronization PLL (see [8] for a thorough discussion of this parameter). As can be seen, there is excellent agreement between (33) and the measured results, and this is also true for (34), albeit to a factors. It lesser degree of congruence for the higher should be noted, however, that the values of and are extremely high compared to those usually is in found in carrier synchronization PLLs; typically, the order of magnitude of 0.01 at most ([11], [15]), for which (as Fig. 6(a) illustrates) the values obtained through (20) and (33)

B = 0:5! ( + 1=(4)), where ! PLL and  is its damping factor [11]. 4

is the natural radian frequency of the

[and even (34)] are virtually identical for all practical ravalues of 0.1 and 0.25 were used tios. The rather large with the intent of making the plots distinguishable, so that the reader could ascertain a qualitative appreciation of the influence of carrier phase jitter on the lock metric value. Consequently, it can be said that for most practical carrier synchronization PLLs the effects of carrier phase jitter on the lock detector value can be neglected. V. LOCK PROBABILITIES AND CIRCUIT PARAMETER DETERMINATION Equations (27) and (20) can be used to set the threshold for assumed achieving lock, from which it is evident that (with an unalterable system-level constant) the only quantity that needs to be decided upon by the designer in order to facilitate determination of the lock detector circuit’s parameters is the for which reliable lock is desired. To illusminimum trate this, for a given threshold , at a given input ratio that we will denote , the lock detection probability and false alarm probability are from (27) (assuming5 , which is reasonable since otherwise we would not be interested in detecting lock at an of )

(35)

(36)

5In fact, we are implicitly making the assumption here that we are disinterested in the detecting lock for any E =N =  for which 0  (); this is (1=2). because for all E =N =  for which 0  () we have P







1666

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 5, SEPTEMBER 2004

(a)

(b)

(c)

1

1

Fig. 6. Theoretical and simulated lock detector values, using equivalent baseband model of Fig. 5, for (a) 2B T = 0:01, (b) 2B T = 0:1, and (c) T = 0:25. Solid line is the theoretical jitter-free case (20). Blank polygons connected by dashed lines are the averages of measured lock detector values obtained in the simulation. Gray-filled polygons are approximations for (33), i.e., the results of multiplying (20) by an estimate (which we will denote ^) of = E [cos(M )], obtained by the time average ^ = cos(M ), where  was measured in the simulation. Similarly, black-filled polygons connected by a dashed line are approximations to (34), where ^ = 1 (1=2)M  . 2B

1

0

1

Solving (35) and (36) through a series of straightforward manipulations yields that suitable6 values of and are (37) and (38) Not surprisingly, (35)–(38) are completely independent of . As has been noted in Section III-D, since is an absowhich is valid for any lute upper bound on the variance of phase jitter conditions, (35)–(38) are equally applicable if significant phase jitter is present, as long as (33) or (34) are used . to ascertain 6Note

that (35) and (36) are inequalities due to the fact that the variance of is bounded by the limit 1=(2N ) [see (26)] and not necessarily equal to it. Thus, computation of (37) will produce somewhat conservative (i.e., larger than needed) values of N .

^ l

Curves of (38) are shown in Fig. 7 for various values of . Note that the value of chosen for each corresponds to a reasonable minimal signal-to-noise ratio (SNR) for which a reliable lock can be expected for that modulation [15]. Graphs of dB, for jitter-free (37) are given in Fig. 8 for QPSK and conditions and for a loop SNR of dB, where is deand (34) is used to compute fined as ([10], [11]) dB. The use of dB and the graphs pertaining to dB allows direct comparison of Fig. 8 to [10, Fig. 6], which, if undertaken, shows that the number of symbols (which ) needed for is somewhat larger (but not excessively is so) than that required for the fourth-order nonlinearity lock detector that is discussed in [10]. However, it must be remembered that (in contrast to this paper) the analysis in [10] makes the assumption generally made in previous analyses of lock detectors, namely that the AGC operates perfectly. As already noted, if the AGC in [10] is not ideal (and none ever is), this will likely have and , which are unaccounted for in adverse effects on

LINN AND PELEG: FAMILY OF SELF-NORMALIZING CARRIER LOCK DETECTORS AND

ESTIMATORS

1667

vantageous to employ an alternate8 M-PSK phase constellation. This constellation is comprised of phases that are rotated by with respect to the M-PSK phases used thus far and are hence given by

(39)

Fig. 7. Required threshold 0 needed to achieve a necessary P various values of M .

and P

for

The lock metrics suggested in this paper can easily be modifiedtoaccommodatetheseconstellations.Itshallbestatedwithout proof that lock detectors for the phase constellation of (39) . This is a direct result of the fact are defined as , where is the lock detector summation that term for the alternate signal constellation. This can be intuitively understood if one realizes that if one negates the contours of Fig. 4 are rotated by , hence accommodating the contours of the rotated constellation. A further immediate application of this -QPSK. realization is toward producing a lock metric for and Lock detection can be achieved by alternately summing , where the alternation occurs in sync with the alternation of the transmitted constellation.9 Note that, naturally, this would be implemented by alternately negating the output of the lookup table in Fig. 2 (rather than introducing an additional lookup table). Thus, the hardware penalty in this case is quite minimal. A similar and to produce procedure, of alternately summing -M-PSK a lock metric, can be applied to the general case of modulations. VII. ANALYSIS FOR PAM-PSK CONSTELLATIONS

Fig. 8. Required number of symbols 2 1 N needed to achieve a necessary P and P , for  = 1 dB, for M = 4 (QPSK), for jitter-free conditions and for a loop SNR of  = 16 dB.

Fig. 6 of [10]. Particularly, if an abrupt fading of the input signal and will be severely affected until the is experienced, AGC has settled; because the AGC generally has a time constant that is orders of magnitudes larger than the symbol interval [11], it will thus take many symbol intervals for the circuit in [10] to and . Such a phenomenon operate anew at the required is entirely absent7 for , and this must be held in context when comparing [10, Fig. 6] to Fig. 8. VI. SPECIAL CASES OF M-PSK SIGNALS Often, especially when used in conjunction with a decisiondirected Costas-type loop for carrier synchronization, it is ad-

7As long as no signal chain or sampler saturation occurs, and the samplers are not underdriven to the extent that quantization noise becomes significant. See Section III-C.

PAM-PSK signals differ from M-PSK signals in that instead of all transmitted symbols having equal energy, the baseband pulses10 are scaled according to the constellation point transmitted, hence resulting in differing symbol energies for different constellation points.11 The preceding analysis of for M-PSK is entirely applicable to such a PAM-PSK constellation, provided that: 1) is chosen to correspond to the total number of discrete phases attained by the constellation, 2) those phases are given12 either by (1) or (39), and 3) in all the is replaced13 by . For insight equations in this paper, into why this is so, it is illuminating to view a superimposed ; this is PAM-PSK constellation on a contour map of 8It should be noted that the “conventional” and “alternate” M-PSK constellations are identical in terms of the signal that is present in the channel during transmission. The distinction between the constellations is really defined by how the receiver operates. Decision-directed phase detection often results in the carrier synchronization loop’s stable equilibrium points being rotated by =M radians (relative to their location in the receivers discussed heretofore). Thus, when synchronized, the baseband demodulated “alternate” constellation of (39) results. 9See [19, Ch. 1] for a discussion of =4-QPSK. 10As was the case during the discussion of M-PSK signals, the baseband pulses are still assumed to produce a post-matched filter waveform that conforms to the Nyquist criterion for zero ISI [5]. 11See [5, Sec. 4.3.1, Fig. 4.3-4] for a discussion of PAM-PSK signals. Note that in [5, Fig. 4.3-4] the definition of M differs from the one utilized here. 12If the phases are given by (1), then ^ is the appropriate detector; if given l by (39), then ^ should be used. l 13For M-PSK, the E =N is also an average quantity, as received symbols differ in their instantaneous E =N as a result of varying noise and channel conditions. The difference with regard to PAM-PSK signals is that the latter’s symbols can have differing a priori symbol energies, resulting in a multitude of received E =N ratios even for identical channel and noise conditions.

1668

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 5, SEPTEMBER 2004

Fig. 9. Received PAM-PSK signal, with E[E ]=N = 20 dB and with receiver in lock, superimposed on contour map of x .

shown in Fig. 9. Because in Fig. 9 the constellation’s symbols have a total of eight phases, the correct structures to use are and . As exemplified in that figure, since many values are averaged in order to produce the lock metric of , the lock metric values will reflect the average of all the symbols used during its computation. Due to ’s independence of , the value of for PAM-PSK constellations—just as was the case for M-PSK—is only dependent of those symbols. upon the average VIII. CONCLUSION A family of carrier lock detectors for M-PSK receivers was presented, its theoretical properties analyzed, and simulations used to validate the results. It was found that the proposed lock metrics could be of substantial practical significance, as they lend themselves to simple hardware implementation and have easily bounded variance behavior that, along with self-normalizing qualities, facilitate straightforward lock threshold determination and detection probability computation. It was further could be easily estimated from found that the channel the lock metric value. Application of the analysis to special -rotated constellacases of M-PSK signals, including -QPSK, and - M-PSK, is discussed. The retions, sults derived for the lock detectors are also applicable to PAMratio refers to the average PSK, where in this case the of that ratio for the received symbols.

[4] R. N. McDonough and A. D. Whalen, Detection of Signals in Noise, 2nd ed. San Diego, CA: Academic, 1995. [5] J. G. Proakis, Digital Communications, 4th ed. New York: McGrawHill, 2001. [6] A. Blanchard, Phase-Locked Loops Application to Coherent Receiver Design. New York: Wiley, 1976. [7] W. C. Lindsey and M. K. Simon, Telcommunication Systems Engineering. Englewood Cliffs, NJ: Prentince-Hall, 1973. [8] H. Meyr, M. Moeneclaey, and S. A. Fechtel, Digital Communication Receivers. New York: Wiley, 1997. [9] M. K. Simon, S. M. Hinedi, and W. C. Lindsey, Digital Communications Techniques. Englewood Cliffs, NJ: Prentice-Hall, 1994. [10] A. Mileant and S. Hinedi, “On the effects of phase jitter QPSK lock detection,” IEEE Trans. Commun., vol. 41, pp. 1043–1046, July 1993. [11] F. M. Gardner, Phaselock Techniques, 2nd ed. New York: Wiley, 1979. [12] H. Gudbjartsson and S. Patz, “The Rician distribution of noisy MRI data,” Magnetic Resonance Medicine, vol. 34, no. 6, pp. 910–914, Dec. 1995. [13] M. R. Spiegel, Mathematical Handbook of Formulas and Tables, Singapore: McGraw-Hill International, 1990. [14] J. Sijbers, “Estimation of signal and noise in magnetic resonance images,” Ph.D. dissertation, Dept. of Physics, Univ. Antwerp, Belgium, 1999. [15] B. T. Kopp and W. P. Osborne, “Phase jitter in MPSK carrier tracking loops: Analytical, simulation, and laboratory results,” IEEE Trans. Commun., vol. 45, pp. 1385–1388, Nov. 1997. [16] W. P. Osborne and B. T. Kopp, “An analysis of carrier phase jitter in an M-PSK receiver utilizing MAP estimation,” in Proc. MILCOM’93, vol. 2, pp. 465–470. [17] R. M. Gagliardi, Satellite Communications. New York: Van Nostrand Reinhold, 1984. [18] H. Taub and D. L. Schilling, Principles of Communication Systems, 2nd ed. New York: McGraw-Hill, 1986. [19] R. L. Peterson, R. E. Ziemer, and D. E. Borth, Introduction to Spread Spectrum Communications. Englewood Cliffs, NJ: Prentice-Hall, 1995. [20] T. A. Summers and S. G. Wilson, “SNR mismatch and online estimation in turbo decoding,” in IEEE Trans. Commun., vol. 46, Apr. 1998, pp. 421–423. [21] D. R. Pauluzzi and N. C. Beaulieu, “A comparison of SNR estimation techniques for the AWGN channel,” IEEE Trans. Commun., vol. 48, pp. 1681–1691, Oct. 2000. Yair Linn (M’01) received the B.Sc. (honors) degree in computer engineering from the Technion Israel Institute of Technology, Haifa, Israel, in 1996. He is currently pursuing the Ph.D. degree in electrical engineering at the University of British Columbia, Canada, under the direction of Prof. M. Yedlin. In the years 1996 to 2001, he was employed as an Electrical Engineer in the Israeli Ministry of Defense, where he worked with the development, implementation, and deployment of wireless communications systems. His current research interests include synchronization in wireless receivers, estimation of wireless channel parameters, and implementation of real-time digital signal processing algorithms in FPGAs. Mr. Linn was awarded the Jean MacDonald Graduate Fellowship scholarship as a winner of the University Graduate Fellowship competition at UBC in 2002. In April 2003, he was awarded a postgraduate scholarship by the National Sciences and Engineering Research Council of Canada (NSERC), as a winner of the 2003 NSERC Postgraduate Scholarship Competition.

ACKNOWLEDGMENT Y. Linn would like to thank Prof. J. Cavers and the anonymous reviewers for their thoughtful comments which helped improve the manuscript immensely.

Nir Peleg was born in Petach-Tikva, Israel, on November 30, 1971. He received the B.Sc. degree in electronic engineering at Ben-Gurion University, Israel, in June 1994 and the M.Sc. degree in electronic engineering from Tel-Aviv University, Tel-Aviv, Israel, in June 2002. He is a Senior Engineer in the Israeli Ministry of Defense, where he has gained vast experience in high-speed MODEM design, simulation, and performance evaluation. His research interests include digital processing systems, filtering, equalization,

REFERENCES [1] A. Mileant and S. Hinedi, “Lock detection in Costas loops,” IEEE Trans. Commun., vol. 40, pp. 2157–2167, Mar. 1992. [2] S. Haykin, Communication Systems, 2nd ed. New York: Wiley, 1983. [3] A. Papoulis, Probability, Random Variables, and Stochastic Processes, 3rd ed, Singapore: McGraw-Hill, 1991.

and parameter estimation.

A Family of Self-Normalizing Carrier Lock Detectors ...

plication specified integrated circuit (ASIC). Analysis ... of one sample per symbol and that sample corresponds to the .... The family of lock detectors is defined as.

1MB Sizes 1 Downloads 203 Views

Recommend Documents

Robust M-PSK Phase Detectors for Carrier ...
[15-22]) systems, which remove the carrier phase error using. Paper approved by C. ... gain detector during tracking, which allows the carrier PLL to maintain ... from IEEE Xplore. Restrictions apply. ...... Princeton, NJ, Mar. 2006. [47] Y. Linn, â€

A Comparison of Video-based and Interaction-based Affect Detectors ...
An online physics pretest (administered at the start of day 1) and posttest ... The study was conducted in a computer-enabled classroom with ..... detectors have been built to some degree of success in whole ..... Sensor-Free Affect Detection for a S

Lock-exchange gravity currents with a high volume of release ...
Feb 24, 2011 - 2Department of Mechanical Engineering, University of California at ..... (Colour online available at journals.cambridge.org/flm) Sketch of a full- ...

Folding pocket knife with a lock
Apr 27, 2010 - house Electric & Manufacturing Company), although other suitable materials such as metal, other plastics, Wood, etc. can also be used.

{ Download } Lock Down Pro - App Lock v2.5 ...
been locked. Lock Down Pro Lock screen: This feature will replace your default lock screen. ... You can also Hide app icon (Remove Lock down Pro icon on App Draw & Home screen). Also try: ... Supported fingerprint for android Marshmallow.

Secrets of Lock Picking
Introduction. Tools. Lock Identification. Pin Tumbler Locks. Wafer Tumbler Locks ..... don't get the warning that a pin tumbler gives before it opens because there is less contact area on the ... and place it at the center of the keyway. To eliminate

LOCK DOWN LOCK OUT (2).pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. LOCK DOWN LOCK OUT (2).pdf. LOCK DOWN LOCK OUT (2).pdf. Open. Extract. Open with. Sign In. Main menu.

EN-SECRETS OF LOCK PICKING.pdf
... be made from a medium-light duty steel spring. As to getting lock picks for your own use, you cannot go down to your local hardware store and buy them. I could supply you with some sources or wholesalers, but I do believe it is illegal for them t

Untitled - Carrier Dome
PROHIBITED ITEMS. SCOLA. BEER. DOTATO. IL ET. Alcoholic Beverages. Coolers. Including small soft sided. Coolers. Open Bottled. Water. Food or Beverage.

Dynamic engagement of human motion detectors across space-time ...
Motion detection is a fundamental property of the visual system. ..... before combining it with B and C. A similar procedure was necessary for. N[0,1] ...... ena. We discuss this potential connection below. Potential significance for suprathreshold .

Tuning properties of the auditory frequency-shift detectors
sure level of 65 dB. The chord of .... justed iteratively using the NCSS statistical software. Table I ..... “Mapping of interactions in the pitch memory store,”. Science ...

Optical Sources and Detectors - Semantic Scholar
1. Introduction. Light is the basis of the science of optics and optical ... sources, scribing, and microfabrication in semiconductor and computer ..... He received his Doctor of Science degree in 1976 from Kapitza Institute for Physical. Problems. T

The Methane Detectors Challenge - Environmental Defense Fund
analysis of a sensor that was previously developed for mine safety applications. The Methane ... system to provide a complete, low-cost sensor package that.

Tank Carrier Services.pdf
licensed benefits counselor by phone 1-855-447-4726 ext. 4435. ○ Aflac deductions stopping June 30th. If you wish to keep these plans on your own. outside of ...

Single Carrier FDMA
May 18, 2008 - Uplink Resource Scheduling in SC-FDMA Systems. Overview of ...... Two types of subcarrier mapping, distributed and localized, give system ...

Carrier Ethernet Architecture.pdf
Page 3 of 25. 3. Sources: The Economist, Cisco Visual Networking Index (VNI) Global Data Traffic Forecast, 2012–2017, Machina. Strong Growth in Many Different Facets Pressures Profitability. 2012 Created More. Information than the past. 5000 years.

Tank Carrier Services.pdf
Page 3 of 4. Tank Carrier Services.pdf. Tank Carrier Services.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Tank Carrier Services.pdf. Page 1 of ...

Tuning properties of the auditory frequency-shift detectors
Irrespective of the chord's properties and of the ISI, performance was best when was equal to about 120 ... Auditory scene analysis has two facets: a segregation facet and an .... mos (2005) proposed a simple qualitative model, similar to a .... Fill

Dynamic engagement of human motion detectors across space-time ...
We account for all results by extending the motion energy model to incorporate a ..... a “hit” classified image (Green and Swets, 1966), demonstrates that (as.

Optical Sources and Detectors - Semantic Scholar
imaging systems in the visible and infrared regions. 1. Introduction ... information processing, optical sensing and ranging, optical communication, ... Visible light, the most familiar form of electromagnetic waves, may be defined as that.

Resistance Temperature Detectors (RTDs)
Resistance Thermometer Wiring Configurations. Two Wire Configuration. ➢ The simplest resistance thermometer configuration uses two wires. ➢ It is only used when high accuracy is not required as the resistance of the connecting wires is always inc

Carrier Ethernet Architecture.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Carrier Ethernet Architecture.pdf. Carrier Ethernet Architecture.pdf. Open. Extract. Open with. Sign In. Mai

Combined container and carrier wristband
Mar 29, 1989 - Assistant Examiner-C. Tuttle. Attorney, Agent, or Firm~Nil1es & Ni11es. [57]. CLAIM. The ornamental design for a combined container and a.