19.11.2014 Views

mohatta2015.pdf

signal processing from power amplifier operation control point of view

signal processing from power amplifier operation control point of view

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

THE MATH 131<br />

6.3.5.1 M-algorithm With the M-algorithm, path pruning is applied at each stage<br />

of a tree search. Only M paths are kept. Steps shown in italics are only used in the<br />

case of a finite decision depth. At each iteration, the following steps are performed.<br />

1. Path Extension: Each path is extended, creating M M candidate paths (the<br />

second M is the number of possible symbol values).<br />

2. Detection of oldest symbol: The best candidate path is identified and the<br />

oldest symbol in its path history becomes a detected symbol value.<br />

3. Ambiguity check. Any candidate path whose oldest symbol value is not the<br />

same as the detected symbol value is discarded (this step is sometimes omitted).<br />

4. Path history truncation: The path histories are truncated to remove the oldest<br />

symbol, now decided.<br />

5. Viterbi pruning: Any paths that correspond to the same Viterbi state are<br />

compared and the nonbest ones are discarded (this step is sometimes omitted).<br />

6. Path selection: Of the remaining candidate paths, only the M best are kept.<br />

Notice that the last step requires an additional sorting operation, which adds to<br />

complexity.<br />

The M-algorithm is considered a breadth-first approach, in that it prunes by<br />

comparing paths of the same length.<br />

6.3.5.2 T-algorithm The T-algorithm is similar to the M-algorithm, except that<br />

the number of paths kept is not fixed, but determined by which path metrics pass<br />

a threshold test.<br />

6.3.5.3 Sequential decoding Sequential decoding is a depth-first approach. The<br />

idea is to continue along a path in the tree as long as the metric growth is "reasonable"<br />

in some sense. When this is not the case, a decision about which path to<br />

"extend" next must be made. This involves comparing paths of unequal length.<br />

6.3.6 Performance results<br />

Like previous chapters, we consider a static, two-tap, symbol-spaced channel with<br />

relative path strengths 0 and —1 dB and path angles 0 and 90 degrees. LE uses<br />

a 31-tap, symbol-spaced filter centered on the first signal path and DFE uses a<br />

16-tap, symbol-spaced filter whose first tap is aligned with the first signal path.<br />

QPSK and root-Nyquist pulse shaping are assumed, so that MLSD has 4 states<br />

and 16 branch metrics computed each iteration. Extra symbols are generated at<br />

the beginning and end of each block to be equalized to avoid edge effects for LE and<br />

DFE and to avoid having to implement metric and state-size transients for MLSD.<br />

This creates performance issues at the edges, which are addressed by starting the<br />

MLSD before the first symbol of interest and ending it after the final symbol of<br />

interest.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!