Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
OPTIMIZING CYCLIC PREFIX LENGTH
FOR DOCSIS 3.1 UPSTREAM
TRANSMISSION
A Thesis Submitted
to the College of Graduate Studies and Research
in Partial Fulfillment of the Requirements
for the Degree of Master of Science
in the Department of Electrical and Computer Engineering
University of Saskatchewan
by
Jing Wang
Saskatoon, Saskatchewan, Canada
c© Copyright Jing Wang, August, 2016. All rights reserved.
Permission to Use
In presenting this thesis in partial fulfillment of the requirements for a Postgraduate degree
from the University of Saskatchewan, it is agreed that the Libraries of this University may
make it freely available for inspection. Permission for copying of this thesis in any manner, in
whole or in part, for scholarly purposes may be granted by the professors who supervised this
thesis work or, in their absence, by the Head of the Department of Electrical and Computer
Engineering or the Dean of the College of Graduate Studies and Research at the University of
Saskatchewan. Any copying, publication, or use of this thesis, or parts thereof, for financial
gain without the written permission of the author is strictly prohibited. Proper recognition
shall be given to the author and to the University of Saskatchewan in any scholarly use which
may be made of any material in this thesis.
Request for permission to copy or to make any other use of material in this thesis in
whole or in part should be addressed to:
Head of the Department of Electrical and Computer Engineering
57 Campus Drive
University of Saskatchewan
Saskatoon, Saskatchewan, Canada
S7N 5A9
i
Abstract
The cable industry originated in United States with the first cable television being in-
vented in 1948. Since the 1990s, many digital devices have been produced and many people
have come to rely on the services provided by cable networks, which has lead to significant
investment in cable network technologies. Interactive programs like GPS, on-line games and
video conferencing, have been introduced in recent years. The customer demands of both
uploading data (upstream) to and downloading data (downstream) from the Internet are
increasing.
There is an international telecommunication standard, DOCSIS, which sets rules for all
cable systems. The latest version DOCSIS3.1 makes a leap forward in technology to offer
larger bandwidth and faster data rates in both upstream and downstream transmissions.
This thesis focuses on one key parameter, cyclic prefix length, of the upstream transmission
system.
The cable modem upstream uses Orthogonal Frequency Division Multiple Access(OFDMA)
for data transmission, which allows a high volume of users to share the whole band at the
same time. Each user occupies a set of sub-carriers for data transmission. The cable mo-
dem transmitter partitions the data into packets that fit into OFDMA frames and sends the
data frames in time sequence to Cable Modem Termination System(CMTS). Different cable
modems in the same frame may have different delays. In each frame, the cyclic prefix is fixed
for all Cable Modems(CMs), and the constellation types can be varied for each CM in order
to achieve the best possible data rate. Therefore, selecting an optimum Cyclic Prefix(CP)
length for the system is an important issue. For all CMs in a frame, if the CP is long enough
to cover the longest delay, the data transmission efficiency will be low. However, if the CP
length is short, some CMs’ performances will be degraded.
To balance the trade-off between the frame length and the signal quality, the purpose of
this research project is to generate a computer program which is able to choose the optimum
CP length for a given cable modem upstream transmission system. The system must obey
the rules set by DOCSIS 3.1.
ii
Several models were built to analyze and corroborate the distribution of interferences
generated by a single sub-carrier when the CP length is insufficient to cover the channel delay.
Finally, a series of mathematical equations, which can successfully estimate the distribution
are developed.
The developed Best CP Length Selection Program is described in detail. The signal
processing procedures and computation methods are explained step by step. The useful
data per minislot was chosen to be the criteria for the program. DOCSIS3.1 allows eleven
CP lengths for the upstream transmission system. By analyzing these allowed CP lengths
and computing the useful data per minislot for each, the best CP length can be determined.
The program was tested for several hypothetical cable networks and generated logical results
in all cases. The results show the Best CP Length Selection Program works properly and is
reliable.
iii
Acknowledgments
I would like to express my thanks to my supervisors, Prof. Brian Daku and Dr. Brian
Berscheid. I really appreciate Prof. Brian Daku who gives me the opportunity to work on
this research topic for Vecima Networks Inc. and he also gives me lots of instructions on
research schedule planning. Dr. Brian Berscheid spends lots of time on my research. He
shows great interests in my work and keeps tracking my process. Thanks for his guidance
throughout my research. He truly gives many valuable comments and suggestions on my
work.
I would also like to thank Prof. Eric Salt. He spends a large amount of his private time
helping me with thesis writing and modifications. I learned many useful writing skills from
him. I really appreciate his work.
I would like to thank all my friends, Yayi, Ben and Chad. I enjoyed lots of interesting and
thoughtful discussions and conversations with them. Thank my boyfriend Xuechao Zhang,
who gives me lots of help and encouragements in my study and life.
Finally, I would like to express my thanks to my parents Qiaolong Wang and Qin Wu.
Thanks for their support and encouragement for the past two years.
iv
Table of Contents
Permission to Use i
Abstract ii
Acknowledgments iv
Table of Contents v
List of Tables ix
List of Figures x
List of Abbreviations xvi
1 Chapter1: Introduction 1
1.1 Cable Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 DOCSIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3.1 CATV Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3.2 Distortion in CATV Network . . . . . . . . . . . . . . . . . . . . . . 6
1.3.3 OFDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.4 Prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.3.5 Signal Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.4 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.5 Thesis Outline and Main Contributions . . . . . . . . . . . . . . . . . . . . . 17
2 Chapter2: Upstream Transmission System 19
v
2.1 Constellation Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.2 Upstream Transmission System . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.2.1 System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2.2.2 System Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.2.3 Simultaneous Upstream Transmissions . . . . . . . . . . . . . . . . . 27
3 Chapter3: Effects of Interference on a Single Sub-carrier 30
3.1 The Distribution of the Interference Generated by a Single Sub-carrier . . . . 34
3.1.1 Channel Model for Physical Plant . . . . . . . . . . . . . . . . . . . . 34
3.1.2 Sources of Interference . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.1.3 Calculation of the Distribution of ISISC(K) and ˜IaSISC(K) . . . . . 42
3.1.4 Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.1.5 Effect of Parameter Values . . . . . . . . . . . . . . . . . . . . . . . . 46
3.1.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3.2 Corroboration of the Distribution of the Interference Generated by a Single
Sub-carrier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3.2.1 The Distribution of ISITOTAL(K) . . . . . . . . . . . . . . . . . . . . 53
3.2.2 Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.2.3 Effect of Parameter Values . . . . . . . . . . . . . . . . . . . . . . . . 61
3.2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
3.3 Convolution Model for the Interference . . . . . . . . . . . . . . . . . . . . . 66
3.3.1 Convolution Based Model . . . . . . . . . . . . . . . . . . . . . . . . 66
3.3.2 Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
vi
3.3.3 Effect of Parameter Values . . . . . . . . . . . . . . . . . . . . . . . . 77
3.3.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3.4 Aggregate Interference Corrupting a Single Sub-carrier . . . . . . . . . . . . 80
4 Chapter4: Best Cyclic Prefix Length Selection 82
4.1 Best CP Length Selection Program Overview . . . . . . . . . . . . . . . . . . 82
4.1.1 Input Parameters to the Program . . . . . . . . . . . . . . . . . . . . 83
4.1.2 Flowchart of the Program . . . . . . . . . . . . . . . . . . . . . . . . 84
4.2 Aggregate Interference Computation . . . . . . . . . . . . . . . . . . . . . . 86
4.3 MER Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
4.4 Constellation Type Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
4.4.1 The Usability of BER and MER Plot . . . . . . . . . . . . . . . . . . 91
4.5 Best CP Length Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
4.6 Program Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.6.1 Parameters Used for Testing . . . . . . . . . . . . . . . . . . . . . . . 94
4.6.2 Uniformly Distributed Echo’s Delays . . . . . . . . . . . . . . . . . . 95
4.6.3 Gaussian Distributed Echo’s Delays . . . . . . . . . . . . . . . . . . . 96
4.6.4 Compact Distribution of Echo’s Delays with “Outliers” . . . . . . . . 99
4.6.5 Compact Distribution of Echo’s Delays with Large Mean . . . . . . . 101
5 Chapter5: Discussion and Conclusion 104
5.1 Results Discussion and Further Test . . . . . . . . . . . . . . . . . . . . . . . 104
5.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
vii
Appendix A DOCSIS 3.1 Table 5-2 108
Appendix B The Main MATLAB Script for the ISI Distribution Simulation
Model 109
Appendix C The Main MATLAB Script for the ISITOTAL Distribution Cor-
roboration Model 112
Appendix D The MATLAB Script for the ISI Distribution Convolution Model115
Appendix E The MATLAB Script for the Aggregate Interference Computa-
tion Function of the Final Model 119
Appendix F The MATLAB Script for the Constellation Order Function of
the Final Model 122
References 124
viii
List of Tables
1.1 The release history of DOCSIS . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 The DOCSIS Upstream Operating Range . . . . . . . . . . . . . . . . . . . . 4
1.3 The DOCSIS 3.1 Downstream Frequency Operating Range . . . . . . . . . . 4
2.1 Constellation types for upstream CM communications . . . . . . . . . . . . . 24
3.1 The parameters for the OFDM system used in the simulation . . . . . . . . . 42
3.2 The parameters for the OFDM system used in the corroboration simulation . 58
3.3 The parameters set for the OFDM system in the corroboration model . . . . 60
3.4 The parameters simulated for the convolution model . . . . . . . . . . . . . 73
4.1 The input parameters for the best cyclic prefix length selection program . . . 83
4.2 The micro-reflections bound for dominant signal echo . . . . . . . . . . . . . 86
4.3 All possible constellation orders for the upstream transmission . . . . . . . . 89
4.4 Parameters used for testing . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.5 Number of users for each constellation type for user group 1 . . . . . . . . . 97
4.6 Number of users for each constellation type for user group 2 . . . . . . . . . 99
4.7 Number of users for each constellation type for user group 3 . . . . . . . . . 101
4.8 Number of users for each constellation type for user group 4 . . . . . . . . . 103
5.1 Number of minislots for each constellation type with echo delays uniformly
distributed for BER no larger than 10−20 . . . . . . . . . . . . . . . . . . . . 106
ix
List of Figures
1.1 The time line of cable industry history (extracted from California Cable &
Telecommunications Association Website) [1] . . . . . . . . . . . . . . . . . . 2
1.2 The structure of cable modem communications system [2] . . . . . . . . . . . 4
1.3 CATV network structure, marking the flowing directions of the upstream
signal and its echo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4 Part of the OFDMA system showing how the data blocks transmitted out in
parallel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.5 The structure showing the working principle of Pre-equalizer . . . . . . . . . 9
1.6 OFDM symbols without prefix . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.7 OFDM symbols with zero prefix and the work procedure of zero prefix . . . 10
1.8 OFDM symbols with cyclic prefix . . . . . . . . . . . . . . . . . . . . . . . . 11
1.9 The OFDM signal structure . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.10 The received Signal I, II and III . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.11 Upstream transmission with OFDM frames [3] . . . . . . . . . . . . . . . . . 14
1.12 The delay time distribution of 105 CMs [4] . . . . . . . . . . . . . . . . . . . 15
2.1 QPSK constellation mapping [3] . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.2 16-QAM constellation mapping [3] . . . . . . . . . . . . . . . . . . . . . . . . 21
2.3 128-QAM constellation mapping [3] . . . . . . . . . . . . . . . . . . . . . . . 21
2.4 A simple structure showing the DOCSIS 3.1 upstream transmission system . 23
2.5 The flow chart showing the signal generation procedure in the CM . . . . . . 26
x
2.6 The flow chart showing the procedure in receiver . . . . . . . . . . . . . . . . 27
2.7 The basic signal processing progress of one CM . . . . . . . . . . . . . . . . 28
2.8 The signal produced by one CM . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.9 The structure of signal sent out by upstream transmitters . . . . . . . . . . . 29
3.1 The transmitted signal in a frame consisting of K OFDMA symbols . . . . . 30
3.2 The received signal (The upper plot is the main path; the lower plot is an
echo with delay D, where D is shorter than the length of CP) . . . . . . . . . 31
3.3 The received signal (The upper plot is the main path; the lower plot is an
echo with delay D, where D is longer than the length of CP) . . . . . . . . . 31
3.4 The impulse response of the physical channel linking a CM to the CMTS . . 34
3.5 The block diagram of the physical channel linking a CM to the CMTS . . . 35
3.6 The block diagram of the physical channel used in this study (amplitude and
delay of the main path compensated) . . . . . . . . . . . . . . . . . . . . . . 35
3.7 The sinusoid in one OFDMA symbol . . . . . . . . . . . . . . . . . . . . . . 36
3.8 The OFDMA symbol with cyclic prefix . . . . . . . . . . . . . . . . . . . . . 36
3.9 The received signal which is the sum of the main path and an echo (The echo’s
delay shorter than the length of CP) . . . . . . . . . . . . . . . . . . . . . . 37
3.10 The received signal which is the sum of the main path and an echo (The echo’s
delay longer than the length of CP) . . . . . . . . . . . . . . . . . . . . . . . 38
3.11 The echo in the extraction interval been completed by adding a segment . . 38
3.12 The diagram of the main path signal and an echo with delay D longer than
CP length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
xi
3.13 The echo in the extraction interval been completed by adding a segment and
include the previous symbol’s echo . . . . . . . . . . . . . . . . . . . . . . . 40
3.14 The structure of the transmitted signal . . . . . . . . . . . . . . . . . . . . . 43
3.15 The received signal with one main path and an echo with delay D and mag-
nitude Ae . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.16 The received main path and the echo scaled in unit of samples . . . . . . . . 44
3.17 ISI distribution with NCP =256, echo delay D=500, echo magnitude Ae =
−16dB and the only non-zero sub-carrier SC-74 . . . . . . . . . . . . . . . . 45
3.18 IaSI distribution with NCP =256, echo delay D=500, echo magnitude Ae =
−16dB and the only non-zero sub-carrier SC-74 . . . . . . . . . . . . . . . . 46
3.19 ISITOTAL distribution with NCP =256, echo delay D=500, echo magnitude
Ae = −16dB and the only non-zero sub-carrier SC-74 . . . . . . . . . . . . . 47
3.20 ISI distributions comparison between the length of the cyclic prefix NCP =
96 and 256 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.21 ISI distributions comparison between the echo’s delay D= 500 and 1000 . . 49
3.22 ISI distributions comparison between the echo’s magnitude Ae = −16dB and
−35dB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.23 ISI distributions comparison between QPSK and 16-QAM systems . . . . . 52
3.24 The transmitted constellation of QPSK . . . . . . . . . . . . . . . . . . . . . 54
3.25 The transmitted constellation and the reference constellation of QPSK . . . 56
3.26 The transmitted constellation, the reference constellation and the received
constellation of QPSK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
xii
3.27 Distribution of ISITOTAL comparing the results of simulation model to cor-
roboration model for NCP=256, echo’s delay D=500, Echo’s magnitude Ae =
−16dB, QPSK modulation type and a single non-zero sub-carrier, SC-74.
Left: Full frequency range
Right: Zoomed on Sub-carrier 74 . . . . . . . . . . . . . . . . . . . . . . . . 60
3.28 Distribution of ISITOTAL comparing the results of simulation model to cor-
roboration model for NCP=96, echo’s delay D=500, Echo’s magnitude Ae =
−16dB, QPSK modulation type and a single non-zero sub-carrier, SC-74. . . 61
3.29 Distribution of ISITOTAL comparing the results of simulation model to cor-
roboration model for NCP=256, echo’s delay D=1000, Echo’s magnitude Ae =
−16dB, QPSK modulation type and a single non-zero sub-carrier, SC-74. . . 63
3.30 Distribution of ISITOTAL comparing the results of simulation model to cor-
roboration model for NCP=256, echo’s delay D=500, Echo’s magnitude Ae =
−35dB, QPSK modulation type and a single non-zero sub-carrier, SC-74. . . 64
3.31 Distribution of ISITOTAL comparing the results of simulation model to cor-
roboration model for NCP=256, echo’s delay D=500, Echo’s magnitude Ae =
−16dB, 16-QAM modulation type and a single non-zero sub-carrier, SC-74. . 65
3.32 The diagram of the main path signal and an echo with delay D longer than
CP length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
3.33 The signal in extraction interval for OFDMA Symbol 2 . . . . . . . . . . . . 67
3.34 Top Plot: The echo portion in the extraction interval;
Bottom Plot: OFDMA Symbol 1. . . . . . . . . . . . . . . . . . . . . . . . . 68
3.35 The structure of the extracting mask designed to extract the ISI segment . 68
3.36 Apply circular shift to the OFDMA Symbol 1 . . . . . . . . . . . . . . . . . 69
xiii
3.37 Transfer the extracting mask from time domain to frequency domain;
Left side: Extracting mask in time domain;
Right side: Extracting mask in frequency domain. . . . . . . . . . . . . . . . 70
3.38 The OFDMA Symbol 1 in frequency domain . . . . . . . . . . . . . . . . . . 71
3.39 The largest case: when the echo is in phase with respect to the signal in the
main path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
3.40 The smallest case: when the echo is 180 degree out of phase with respect to
the signal in the main path . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
3.41 Distribution of ISI for the largest case. Comparing the results of simulation
model to convolution model for NCP=256, echo’s delay D=500, Echo’s mag-
nitude Ae = −16dBand a single non-zero sub-carrier, SC-74.
Left: Full frequency range
Right: Zoomed on Sub-carrier 74 . . . . . . . . . . . . . . . . . . . . . . . . 74
3.42 Distribution of ISI for the smallest case. Comparing the results of simulation
model to convolution model.
Left: Full frequency range
Right: Zoomed on Sub-carrier 74 . . . . . . . . . . . . . . . . . . . . . . . . 75
3.43 Distribution of ISI for the average case. Comparing the results of simulation
model to convolution model.
Left: Full frequency range
Right: Zoomed on Sub-carrier 74 . . . . . . . . . . . . . . . . . . . . . . . . 76
3.44 Distribution of ISI comparing the results of simulation model to convolution
model for NCP=96, echo’s delay D=500, Echo’s magnitude Ae = −16dB and
a single non-zero sub-carrier, SC-74. . . . . . . . . . . . . . . . . . . . . . . . 78
3.45 Distribution of ISI comparing the results of simulation model to convolution
model for NCP=256, echo’s delay D=1000, Echo’s magnitude Ae = −16dB
and a single non-zero sub-carrier, SC-74. . . . . . . . . . . . . . . . . . . . . 79
xiv
3.46 Distribution of ISI comparing the results of simulation model to convolution
model for NCP=256, echo’s delay D=500, Echo’s magnitude Ae = −35dB and
a single non-zero sub-carrier, SC-74. . . . . . . . . . . . . . . . . . . . . . . . 80
4.1 Flow chart of the working process of the Best CP Length Selection Program 85
4.2 MER in dB vs. BER plot for all possible constellation orders . . . . . . . . . 90
4.3 An example to show how to choose a suitable constellation type . . . . . . . 91
4.4 The histograms of errors in active sub channel for QPSK with NCP=256,
D=500, Ae=-16dB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
4.5 Distribution of echo’s delay in user group 1 . . . . . . . . . . . . . . . . . . . 95
4.6 The useful data per minislot for user group 1 . . . . . . . . . . . . . . . . . . 96
4.7 Distribution of echo’s delay in user group 2 . . . . . . . . . . . . . . . . . . . 97
4.8 The useful data per minislot for user group 2 . . . . . . . . . . . . . . . . . . 98
4.9 Distribution of echo’s delay in user group 3 . . . . . . . . . . . . . . . . . . . 100
4.10 The useful data per minislot for user group 3 . . . . . . . . . . . . . . . . . . 100
4.11 Distribution of echo’s delay in user group 4 . . . . . . . . . . . . . . . . . . . 102
4.12 The useful data per minislot for user group 4 . . . . . . . . . . . . . . . . . . 102
5.1 The useful data ratio per minislot for each CP length with BER requirement
to be 10−20 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
A.1 Table 5 2 - Typical Upstream RF Channel Transmission Characteristics . . 108
xv
List of Abbreviations
AWGN Additive White Gaussian Noise
BER Bit Error Rate
BPSK Binary Phase Shift Keying
CATV Cable Television
CM Cable Modem
CMTS Cable Modem Termination System
CP Cyclic Prefix
DFT Discrete Fourier Transform
DOCSIS Data Over Cable Service Interface Specification
FEC Forward Error Correction
FFT Fast Fourier Transform
LDPC Low-Density Parity-Check
IaSI Intra Symbol Interference
ICI Inter Carrier Interference
IDFT Inverse Discrete Fourier Transform
IFFT Inverse Fast Fourier Transform
ISI Inter Symbol Interference
MAC Media Access Control
MATLAB Matrix Laboratory
MER Modulation Error Ratio
OFDM Orthogonal Frequency-Division Multiplexing
OFDMA Orthogonal Frequency-Division Multiple Access
QAM Quadrature Amplitude Modulation
QPSK Quadrature Phase Shift Keying
RP Roll-off Period
SC Sub-Carrier
SER Symbol Error Rate
SNR Signal Noise Ratio
xvi
1. Chapter1: Introduction
1.1 Cable Industry
Cable television originated in United States in 1948 [5] and later transitioned into broad-
band cable communications. A cable modem is a type of bridge, connecting users’ devices to
the Internet [6]. Figure 1.1 shows the evolution time line of cable network industry. In 1990s,
the capacity of cable networks had to expand to accommodate new digital services, including
cable telephone, high-speed Internet, high definition TV and digital recorders. People are
more and more dependent on the digital services provided by cable networks, which leads to
the cable industry expanding bandwidth and offering more services.
Initially, the cable network was a one-way data transmission system. It was a broadcast
system, where signals are unidirectional and transmitted from a central point to all users [7].
Interactive programs are among the recently introduced services. In the recent years,
there are lots of applications which require interaction between users and the Internet, like
GPS, on-line games and video conferencing [8]. The demand for users to upload data to the
Internet is ever increasing. Therefore, the cable network is increasing the bandwidth of the
upstream communication for uploading data from users to the Internet.
The demands of uploading data to and downloading data from the Internet are still
increasing [9]. The latest standard DOCSIS 3.1, makes a leap forward in technology to offer
larger bandwidth and faster data rates in both the upstream and downstream directions.
The standard will be discussed in Section 1.2. To meet this standard, a new cable modem
system must be designed. This thesis will focus on one of the key issues in the upstream
communication link.
1
Figure 1.1 The time line of cable industry history (extracted from California Cable
& Telecommunications Association Website) [1]
2
Table 1.1 The release history of DOCSIS
Version Year
DOCSIS 1.0 1997
DOCSIS 1.1 1999
DOCSIS 2.0 2001
DOCSIS 3.0 2006
DOCSIS 3.1 2013
1.2 DOCSIS
DOCSIS which is short for Data Over Cable Service Interface Specifications, is an in-
ternational telecommunications standard set for all cable systems [3]. DOCSIS is developed
and released by CableLabs, which is a consortium of cable network, operators and equipment
suppliers, including 3Com, BigBand Networks and Cisco.
There are many manufacturers producing cable modems and cable modem termination
systems. Customers can buy a cable modem from a manufacturer of their choice. To
make sure different brands’ cable modems are able to communicate with the cable modem
termination system (CMTS), all the manufacturers must obey the rules set by DOCSIS.
With the increasing user demand, CableLabs also keeps updating DOCSIS by setting new
bandwidth, modulation types and other communication techniques. Table 1.1 shows the
releasing history of DOCSIS.
DOCSIS 3.1 was released in 2013 and updated several times. The most recent modifica-
tion is December, 2014.
A CATV communication system provides a gateway between a cable modem in sub-
scribers residence and the Internet. The basic structure for a CATV communication system
is shown in Figure 1.2 . A CATV communication system can be separated into three parts:
the CMTS, the cable plant and the Cable Modem (CM). The CMTS is a transfer station,
communicating with both CM and Internet to help organize and satisfy all the requests [10].
The CMTS can be further separated into two parts: the Media Access Control (MAC)
3
Figure 1.2 The structure of cable modem communications system [2]
Table 1.2 The DOCSIS Upstream Operating Range
Lower Band Edge Upper Band Edge
5MHz 204MHz
Layer and the Physical Layer [11]. The MAC layer is the software responsible for arranging
the signal transmission sequence, setting parameters for things like the Cyclic Prefix (CP)
length and all the programmable logic. The Physical Layer is responsible for modulating the
transmitted data, demodulating the received data and all other logic built in hardware.
The communication between the CM and the CMTS is two-way. Data transferred from
the CM to the CMTS uses upstream bandwidth, and data transferred from the CMTS to
the CM uses downstream bandwidth. Table 1.2 shows the DOCSIS upstream frequency
operating range, which is from 5MHz to 204MHz. Table 1.3 shows the DOCSIS downstream
frequency operating range, which must support frequency from 258MHz to 1218MHz and
should allow the frequencies from 108MHz to 1794MHz [12].
Since users download much more things from the Internet, the downstream bandwidth
is much wider than the upstream one. However, with the increasing use of interaction
Table 1.3 The DOCSIS 3.1 Downstream Frequency Operating Range
Requirement Lower Band Edge Upper Band Edge
MUST 258MHz 1218MHz
SHOULD 108MHz 1794MHz
4
Figure 1.3 CATV network structure, marking the flowing directions of the up-
stream signal and its echo
like games, the demand of uploading data is increasing. To accommodate this increasing
demand, DOCSIS 3.1 expands the upstream bandwidth from 5-85MHz to 5-204MHz and
switches from single carrier QAM to OFDM modulation. The implication is a new upstream
system must be developed for DOCSIS 3.1.
1.3 Background
1.3.1 CATV Networks
CATV is commonly known as cable TV. CATV networks do not only deliver TV pro-
grams, but also Internet service. Therefore, the communication between the CMs and the
CMTS is two-way. In this research project, only the upstream transmission system, which
is transmission from the CM to the CMTS will be considered.
In the upstream transmission system, cable modems connect to the users’ devices and
collect data from them. Coaxial cable transfers the users’ data to the CMTS and the CMTS
is responsible for interfacing to the Internet. The structure of the CATV network in shown
in Figure 1.3 .
5
1.3.2 Distortion in CATV Network
In the coaxial cable network, a directional coupler [13] is used to extract some power from
the downstream transmission and send to the CM, and direct the signal generated by the
CM in the upstream direction. These couplers are shown in Figure 1.3, as the dots labelled
Coupler 1 and Coupler 2.
All the components are attached to the system with connectors. At each connection
point, there is a probability of an impedance mismatch. Usually, connectors are perfectly
matched and will not cause signal distortion. An imperfect connector passes most of the
signal power through and reflects the rest power back. Therefore, once a signal is sent out,
it will be reflected at imperfect connectors. The main signal with most power will continue
transmitting in the original direction and the reflected signal will travel in the opposite
direction. When the reflected signal encounters a mismatched connector, a portion of it is
reflected. This second reflection now travels in the same direction as the original signal and
is referred to as an echo.
Figure 1.3 shows part of the signal flowing in the upstream transmission. Cable modem
1 sends out Signal 1. When reaching Coupler 1, the signal is attenuated by the tap gain
and sent in the direction of the CMTS. This signal is shown in Figure 1.3 as Signal 2.
Unfortunately, the directional couplers are not perfect and some of the signal from CM 1 is
sent downstream. This downstream component is typically 20dB below the original signal.
The signal is shown in Figure 1.3 as Signal 3. Now suppose there is a bad connector on
Coupler 2. This will cause Signal 3 to be reflected back toward the CMTS. The reflected
portion of Signal 3 is shown as Signal 4 in Figure 1.3. Signal 4 keeps transmitting in the
toward CMTS direction. Signal 4 is slightly attenuated by the insertion loss of Coupler 1 to
become Signal 5. Signal 5 is received by the CMTS as an echo.
1.3.3 OFDM
OFDM is short for orthogonal frequency-division multiplexing. It is a modulation method
to encode data on multiple carrier frequencies for high data rate transmission [14]. In the past
6
Figure 1.4 Part of the OFDMA system showing how the data blocks transmitted
out in parallel
few years, OFDM has been increasingly emphasized on applications to worldwide telecom-
munication networks, especially the 4G and wifi networks [15].
OFDMA is short for orthogonal frequency-division multiple access. It is a multi-user
version of the OFDM modulation. In an OFDMA system, high volume of data is to be
transmitted over a large number of low rate carriers. The carriers are orthogonal to each
other and the frequency space between them is decided by the size of the Fourier Transform
[16]. Each of the sub-carriers is able to transmit data independently. At the receiver, the
demodulator will recover all signals and separate them according to frequencies. Therefore,
OFDMA method allows a large amount users to share the frequency band and transmit data
in parallel.
Take the system in Figure 1.4 for example. It is a 2k FFT system with 2048 sub-carriers
in total and the active sub-carriers are from 74 to 1973. The inputs to this system are 1900
independent data sources. As Figure 1.4 shows, the three data blocks can be transmitted
at the same time by assigning them to different sub-carriers. Equation 1.1 explains the
procedure in a mathematical way.
x(n) =1√N
N−1∑k=0
X(k)ej2πnkN , 0 ≤ n ≤ N − 1, (1.1)
The operation shown in equation 1.1 is an Inverse Fast Fourier Transform(IFFT), which
7
converts the signals in frequency domain to time domain. Therefore, the output of equa-
tion 1.1 is a time domain OFDM symbol array. A more detailed description of an OFDM
system is given in Chapter 2.
In an OFDM system, the useful information is coded into the amplitude and phase of each
sub-carriers. Therefore, the aim of system is to precisely recover the amplitude and phase
of the received signals at each frequency. Imagine a perfect system where signal Aej(ωt+θ) is
sent out through the transmitter. The transmitted signal has amplitude A, phase shift θ in
the unit of radians and angular frequency ω in the unit of radians per second.
Transmitted−signal = Aej(ωt+θ); (1.2)
Ideally, at the demodulator, the recovered signal will be the same as the transmitted
signal. Because of the transmission distortion, when the signal arrives at the receiver, it will
always be delayed and attenuated comparing to the transmitted one, which can be expressed
as
Main−signal = A1ej(ω(t−τ)+θ); (1.3)
Where A1 is the received amplitude of the main signal, τ is the delay in the unit of second.
However, when an echo exists, the received signal is the sum of the main signal and the
echo, as Equation 1.4 shows.
Received−signal = A1ej(ω(t−τ)+θ) + Aee
j(ω(t−te)+θ) (1.4)
Where Ae is the amplitude of the echo and te is the echo’s delay compare to the trans-
mitted signal. Since an echo is just a repetition of the original signal with less power, the
phase shift of the driving signal θ still remains the same.
For each sub channel, the frequency response is a constant. By comparing the received
signal with the transmitted signal, the distortion percentage can be computed. To make the
amplitude and phase of the received signal the same as the one transmitted, a pre-equalizer
is added to the system. As Figure 1.5 shows, the pre-equalizer adjusts the amplitude and
phase of the original signal before it is sent out. Then with the effect of echo in this sub-
8
Figure 1.5 The structure showing the working principle of Pre-equalizer
Figure 1.6 OFDM symbols without prefix
carrier, the received signal is still the same as the original one. The pre-equalizer helps to
compensate for the signal distortion caused by the echo.
However, the pre-equalizer only works well when the received echo is still a complete
sinusoid, which can be expressed as the component in Equation 1.4. Once the echo is not
a full sinusoid or some other signals are included, because of these interferences, the pre-
equalizer cannot compensate for the distortion in the received signal. To make the echo to
be a full sinusoid, cyclic prefix should be included, which is introduced in the next section.
1.3.4 Prefix
As discussed in Section 1.3.3, the signal sent out by the transmitter is an array of OFDM
symbols. Figure 1.6 shows two adjacent OFDM symbols. To make it easy to understand, the
two OFDM symbols are constructed as single sinusoids, but with different frequencies. The
upper plot is the main transmitted signal and the lower one is an echo. The demodulator
will detect and extract the OFDM symbol from the received signal. The extraction interval
9
Figure 1.7 OFDM symbols with zero prefix and the work procedure of zero prefix
depends on the location of the main transmitted signal. Therefore, the area between red
dashed lines will be extracted by the demodulator for signal recovery. It can be seen that,
once there is an echo, no matter how short the delay, part of the previous symbol will fall into
the current extraction interval, as the red curve of each symbol shows in Figure 1.6. Part
of the current echo will fall into the subsequent extraction interval. Therefore, the current
echo is no longer a completed sinusoid and the echo from the previous sinusoid is shifted into
the extraction interval. The portion of the echo shifted into the extraction interval from the
echo of the previous signal is called Inter Symbol Interference (ISI). The missing portion of
the self echo is also interference. It is called Intra Symbol Interference (IaSI). Both type of
interference can be avoid by inserting a prefix in front of each symbol.
The prefix is a guard interval between OFDM symbols to separate them with the purpose
of avoiding (if the guard interval is large enough) or reducing (if the guard interval is not
large enough) the effect of echo.
There are two possibilities for prefix: one of all zeros and the other being a cyclic extension
time domain OFDM signal. The all-zero prefix is illustrated in Figure 1.7 . Each time domain
symbol is preceded with a sequence of zeros. Still, the extraction interval is set to extract
10
Figure 1.8 OFDM symbols with cyclic prefix
the main signal, which is the interval between the red dashed lines. As the middle plot
of Figure 1.7 shows, the echo from the previous symbol does not shift through the guard
interval and reach the extraction interval. Therefore, there is no ISI. However, there is still a
sequence of the self echo missing in the extraction area. This missing piece can be replaced by
adding the guard interval that follows a symbol to the beginning of the extraction interval.
The cut-and-paste procedure is described in the last plot of Figure 1.7. The green curve
which is outside of the extraction interval in the middle plot is moved and attached to the
front of the symbol. This makes the echo a complete sinusoid in the extraction interval and
eliminate the IaSI.
A cyclic prefix is constructed by repeating the end of an OFDM symbol and adding it to
the front of each symbol to form a guard interval of a different sort [17]. Figure 1.8 shows the
structure of cyclic prefixed signal and the magenta curves appended to the OFDM symbols
are cyclic prefix. The lower plot is an echo of the signal. With the delay, part of the symbol
falls out and part of the cyclic prefix falls into the extraction interval. Since the cyclic prefix
is a repetition of part of the symbol, it still remains a full sinusoid. Therefore, no interference
will be introduced in this case. However, if the delay is longer than the cyclic prefix, it is
another story, which will be introduced in the next section.
To ensure the quality of the OFDM signal transmission, each OFDM symbol must be
prefixed. In DOCSIS 3.1 and therefore in this research, cyclic prefix separates the OFDM
11
Figure 1.9 The OFDM signal structure
symbols. Should the cyclic prefix be long enough, both ISI and IaSI can be completely
removed.
1.3.5 Signal Construction
To maximize the channel capacity, the time domain symbol is windowed to sharpen the
edges of the OFDM signal spectrum [18]. For the windowing purpose, a cyclic suffix called
roll-off period(RP) [19] is appended to the end of OFDM symbol.
The upper diagram in Figure 1.9 shows two complete signals constructed with CP, OFDM
symbol and RP. The transmission of a subsequent signal starts at the beginning of the RP.
That is the RP of one symbol overlap the CP of the following symbol. For ease of drawing
the RP of the previous symbol, RP is considered part of the CP of the next signal as shown
at the bottom of Figure 1.9.
In the case of the signal reflection discussed in Section 1.3.2, after the upstream demodu-
lator receives the main transmitted signal, it will receive attenuated echo signals. Figure 1.10
is a reduced diagram showing the main transmitted Signal I, the reflected Signal II and III
with different echo delays D1 and D2. Assume D1 is shorter than CP length and D2 is longer
than CP length.
The red box area shown in Figure 1.10 is one of the extraction intervals of the demodu-
lator. For Signal II, the CP length is longer than the delay D1. Part of the cyclic prefix data
and echo signal will be extracted by the demodulator. According to the working principle
of cyclic prefix, the extracted signal is still a full sinusoid, which will not cause noise for the
12
Figure 1.10 The received Signal I, II and III
signal recovery.
For Signal III, delay D2 is longer than the CP length. Not only the whole cyclic prefix
portion, but also part of the previous symbol will be shifted to the extraction interval. The
extracted echo signal is a combination of two sinusoid with different frequencies. It is no
longer a completed sinusoid orthogonal to the main symbol. The noise introduced is called
inter symbol interference, or ‘ISI’ for short. In the upstream transmission system, there
are two kinds of ISI, Self-echo ISI and Simultaneous ISI. More detailed description and
explanation of these type will be given in Chapter 3.
1.4 Problem Statement
The cable modem upstream transmitter partitions the data into packets that fit into
OFDM frames and sends the data frame by frame to CMTS. As Figure 1.11 shows, the
OFDM frames are sent out in time sequence. Each frame has the same duration and occupies
the entire active upstream spectrum. For example, with 50kHz sub-carrier spacing, the
upstream spectrum is occupied with 2048 sub-carriers in total. Only sub-carriers numbered
from 74 to 1973 are active, the rest form guard bands in the frequency domain. A group
of Q contiguous sub-carriers, where Q could be 8 or 16, form a minislot. OFDM frames
are shared by CMs. Each of the CMs is assigned one or more separate minislots. Once the
13
Figure 1.11 Upstream transmission with OFDM frames [3]
length of the cyclic prefix is chosen, it is the same for all symbols and can not be set on a
minislot basis to match a particular CM. However, the modulation order can be set on a
minislot by minislot basis to match the quality of the channel of the CM assigned to the
minislot.
Cable modems are connected to the CMTS through different channels that may have
strong or weak echos and more or less noise. Therefore, different minislots in the same frame
might have different echo delays. Since the CP length is fixed for all minislots, for some the
length of the CP may be excessive and for others it may be too short. Choosing the best
length for the CP is an important issue. On one hand, if the CP length is long enough to
avoid ISI in all minislots, i.e. sized for the worst case CM, the data transmission efficiency
will be low. On the other hand, if the CP length is shorter than the echo delay for a few
CMs, ISI will result, and the performance of these CMs will be degraded.
This sets up a trade-off between frame length and signal quality. Since the cyclic prefix
14
Figure 1.12 The delay time distribution of 105 CMs [4]
does not contain any useful information, it is overhead and should be kept to a minimum.
However, if the CP is short, it causes ISI and increases the error rate for some CMs. A
detailed analysis is given with an example below.
Figure 1.12 is a histogram of the echo delay for 105 CMs in a hypothetical network. The
shape of the distribution is referred to the analysis of real applications [4]. Most of the CMs
have echo delays shorter than 3µs. Only 13 out of 105 CMs have echo with delays between
3µs and 6µs. The trade-off is: If the CP is sized for the worst case echo, i.e. set to be 6µs,
as indicated by the dash line on the right(green) in Figure 1.12, the length of the CP will
be longer than the delay of the longest echo. No ISI will exist for any CM, which is perfect
for signal quality. However, most CMs don’t need such a long CP to have perfect signal
qualities. A shorter CP length is enough for them to make perfect transmission without any
ISI. Therefore, if the cyclic prefix is longer than necessary for most CMs, the cost of the extra
overhead is born by all. Clearly if the cyclic prefix is shortened, the order of modulation
would have to be reduced in some CMs, which means they would need more minislots to
transmit their data. Of course, this reduces transmission efficiency.
15
If CP length is set to be 3µs, in the place where the dash line on the left (red) is, CMs
with echo delays shorter than 3µs (92 out of 105) will not generate ISI in the receiver. 13
users will experience lower quality transmission. However, the transmission efficiency may
be higher when the shorter CP length is used. Actually, the 13 users suffering from ISI
can be assigned lower order modulation, to reduce the bit error rate to a safe range. Lower
modulation order means lower data rate, but to ensure the transmission quality, lower data
rate for limited CMs is acceptable. In this case, the 3µs CP seems to be a reasonable choice.
Nevertheless, it might not be the best one. The best choice is the one that maximizes system
throughput.
The aim of this thesis is to develop a technique to find the best CP length for an upstream
transmission system. The intent is to maximize through put by balancing the transmission
efficiency and quality. The performance measure used to evaluate the transmission perfor-
mance is the average data throughput.
The best choice for the CP length depends on the distribution of echo delay, echo magni-
tudes, as well the bit error rate (BER) requirement. Different CATV systems have different
characteristics, so the input parameters will be different. In this research, the input param-
eters are defined by the researcher, just for test. However, the technique could apply to
any DOCSIS system, analyzing the stored users’ information and then suggesting a best CP
length.
The research content introduced in this thesis is meant to be a ‘model of concept’. Some
factors are ignored to make the main idea more clear and logical. The bit error rate considered
in this thesis is the one before low-density parity-check (LDPC) is applied. For future study,
all the missed details can be added to make the model more exact.
To achieve the final purpose, the research is conducted step by step. It starts with a simple
model to explore the effect of the length of the CP on the ISI distribution in frequency and
modulation error ratio (MER) of each sub-carrier. The model is sufficiently accurate to
determine the sensitivity of data throughput to the length of the CP.
16
1.5 Thesis Outline and Main Contributions
The thesis has five chapters in total.
Chapter 1 first introduces some background information, including the cable modem
industry, DOCSIS and its released history. Then, to better explain the purpose of this
thesis, some background knowledge about cable modem upstream transmission is included.
The introduction of the working principles of the CATV networks and the distortion in
CATV networks gives a general idea about CATV networks. The knowledge of OFDM,
prefix and signal construction can help to explain the existing problem. Finally, the purpose
and the desired results of this research project are also described in Section 1.4. A computer
program which is able to choose the optimum CP length for the cable modem upstream
transmission system is expected to be generated in this research. The system must obey the
rules set by DOCSIS 3.1.
Chapter 2 introduces some basic concepts of an OFDM system in order to give some
general idea to readers who are not familiar with wire line communication. Modulation and
constellation mapping are introduced first and followed by the OFDM system construction.
The OFDM system is the most basic model used in the research. Therefore, a detailed
explanation of the OFDM system is given, including the transmitter, channel and receiver.
In Chapter 3, the effects of interference on a single sub-carrier is studied. In a practical
system, Inter Symbol Interference (ISI) which is caused by neighbouring symbols and Intra
Symbol Interference (IaSI) which is caused by self inflicted, will be introduced into the
upstream transmission system. To study the distribution of the interference of a single sub-
carrier among all other sub-carriers, the sources of the two interferences are analyzed and
the theoretical computation methods are discussed. Finally, a model based on detecting
the sources of the interference is generated and the interference distribution is plotted. The
effect of some relevant parameters, including CP length, echo’s delay, echo’s magnitude and
modulation order are also studied.
To corroborate the analysis of the interferences in the first model, a corroboration model
is built based on analyzing the constellation points constructed from the received signal and
17
finding the error caused by the interference. The results and plots of the corroboration model
proves the analysis of the sources of the interferences in the first model is correct.
The identified and corroborated sources will be used in the convolution model, which
is developed to estimate the distribution of the interferences of a single sub-carrier. The
convolution model contains a series of mathematical expressions, including the convolution
of a symbol with a mask. The distribution of the interferences plotted by the convolution
model matches the corroboration model well. Therefore, a series of mathematical equations,
which can successfully estimate the distribution of interference of a single sub-carrier, are
developed and this is one of the contributions of this thesis.
The distribution of interferences of a single sub-carrier is estimated with the convolution
model. The variable of interest is the aggregate interference corrupted in each sub-carrier
and the computation method is also given in Chapter 3.
Based on all the work done in previous chapters, Chapter 4 introduces the Best CP
Length Selection Program in detail. The overview and the inputs and output of the pro-
gram are described first to give a general idea. Then, the signal processing procedures are
introduced step by step. The criteria used to assess the program is the useful data per
minislot. DOCSIS3.1 allows eleven CP lengths for the upstream transmission system. The
program is run iteratively for each of these CP options. The one giving the best useful data
per minislot will be selected to be the optimum CP for the system. The program is tested
with four different distributions of users and delays. The results show the Best CP Length
Selection Program works properly.
Chapter 5 discusses the results from Chapter 4 and some further tests are made on the
program to make sure the program is reliable. Based on the current developed Best CP
Length Selection Program, the future work is also discussed in this chapter.
The appendices mainly include some necessary Matlab codes for this project.
18
2. Chapter2: Upstream Transmission System
A simple cable modem upstream transmission system, including transmitter, channel and
receiver will be introduced in this chapter.
Before describing the principle of the system, some concepts about modulation and con-
stellation mapping will be introduced. These concepts will be used in describing the system.
2.1 Constellation Mapping
Modulation is the variation of one or more properties of an RF signal such as frequency,
amplitude and phase in order to represent data [20]. There are basic digital modulation
formats like FSK (Frequency-shift keying), ASK (Amplitude-shift keying) and PSK (Phase-
shift keying) [21]. QAM (Quadrature Amplitude Modulation) is also a kind of modulation,
which modulates the amplitudes of two carrier waves which have the same frequency and
are 90 degrees out of phase [22]. DOCSIS upstream channels use the QAM modulation
technique.
In order for successful communication to occur, the transmitter and receiver need to agree
upon how a set of message data bits will be used to vary the properties of an RF carrier
signal. The typical approach is to group multiple data bits together, then modulate the RF
signal in a specific way, depending on the values of the data bits. A mapping rule is specified
which defines the symbol (modulated waveform) to be transmitted for each possible set of
data bits.
To illustrate this concept, a constellation mapping diagram can be used to represent the
modulation. For QAM, the constellation mapping diagram contains a real (or I, which stands
19
Figure 2.1 QPSK constellation mapping [3]
for in-phase) axis and an imaginary (or Q, which stands for quadrature) axis. These axes
are used to build a Cartesian coordinate space. Each of the possible transmitted symbols
can be mapped to a point in the I and Q space. A variety of different mapping rules are
possible. In general, a mapping rule which includes M possible symbols is referred to as an
M-QAM constellation. The amplitude and phase of each point in the constellation diagram
indicates the amplitude and phase with which the RF carrier is modulated.
For example, consider a 4-QAM symbol mapping, which is also known as QPSK. Fig-
ure 2.1 shows one possible constellation mapping for QPSK. From Figure 2.1, it can be seen
that, QPSK has four constellation points. When the value of the data to be transmitted
equals 0, the mapped position is (1 + 1i). When the symbol value equals 1, the mapped
position is (1− 1i). When the symbol value equals 2, the mapped position is (−1 + 1i), and
when the symbol value equals 3, the mapped position is (−1−1i). Therefore, for QPSK, four
different numbers can be transmitted. The four different signals have the same amplitude,
which is√
2, but different phases.
In the same fashion, QAM constellation maps for the other constellation orders can be
generated. Figure 2.2 shows the constellation map of 16-QAM and Figure 2.3 shows the
constellation map of 128-QAM. It can be seen that a higher constellation order is able to
transmit more data in a symbol. DOCSIS 3.1 specifies a set of constellation mappings which
are to be used for upstream transmission [3]. These allowed mappings are discussed in more
detail in the following sections.
20
2.2 Upstream Transmission System
The DOCSIS 3.1 upstream transmission system consists of three main parts: CMs, a
CMTS, and the cable plant connecting them. Figure 2.4 is a simple structure showing how
the upstream signal is generated in a DOCSIS 3.1 system.
In the CMs, since the upstream transmission system uses OFDM method to encode data,
many CMs are allowed to transmit data in parallel. This is achieved by allocating different
carrier frequencies to them. Therefore, many CMs can share the upstream band at the same
time for transmission. In the real system, each CM may have different performance due to
variations in the quality of the cable plant connecting the CM to the CMTS. Furthermore,
the channel assigned to each CM may suffer from different delays. Therefore, DOCSIS
allows the constellation type for each CM to be assigned independently to ensure adequate
transmission quality. However, the cyclic prefix length for all CMs transmitting data at the
same time must be the same. Part of the signal processing is conducted at each transmitter,
including adding cyclic prefix, applying window, etc.
The upstream signal is sent on a frame by frame basis. Each upstream frame typically
consists of signals transmitted synchronously from multiple CMs.
At the CMTS, the receiver will decode the received signal. Depending on the frequency
of each transmitted data, the CMTS is able to separate the signals transmitted by the
individual CMs.
The following sub-sections explain the characteristics and composition of the upstream
signal at the receiver. First, section 2.2.1 describes some of the fundamental system param-
eters of the upstream signal. Next, section 2.2.2 explains the signal processing operations
performed in a single transmitting CM and the receiving CMTS. Finally, section 2.2.3 dis-
cusses how simultaneous transmissions from multiple CMs are combined through the channel
and received at the CMTS.
22
Table 2.1 Constellation types for upstream CM communications
Constellation Type Number of bits per symbol (k) Number of symbols (M)
QPSK 2 4
8-QAM 3 8
16-QAM 4 16
32-QAM 5 32
64-QAM 6 64
128-QAM 7 128
256-QAM 8 256
512-QAM 9 512
1024-QAM 10 1024
2048-QAM 11 2048
4096-QAM 12 4096
2.2.1 System Parameters
All parameters are defined following the rules in DOCSIS 3.1 Physical Layer Specification
[3].
• The variable N FFT refers to the size of the Fast Fourier Transform used to construct
the upstream signal. The FFT length could be either 2048 or 4096.
• As described in section 1.3, the CP is a string of data inserted before each OFDMA
symbol to prevent intersymbol interference. DOCSIS 3.1 allows eleven possible CP
lengths: 96, 128, 160, 192, 224, 256, 288, 320, 384, 512 and 640.
• The constellation types allowed for use in DOCSIS 3.1 upstream transmission are shown
in Table 2.1.
The number of active sub-carriers is limited by DOCSIS 3.1 For example, in the case
of a 2048 point FFT, the upstream channel contains a total of 2048 sub-carriers. However,
only 1900 of the sub-carriers (sub-carriers 74-1973) are active sub-carriers which are used to
24
transmit data. The remaining sub-carriers are treated as a guard band in order to reduce
leakage from adjacent channels.
The 1900 sub-carriers are grouped into minislots, where each minislot contains 8 sub-
carriers. For example, sub-carriers 74-81 make up the first minislot, sub-carriers 82-89 make
up the next adjacent minislot, and so on. Each CM will be assigned one or more minislots
for data transmission.
2.2.2 System Construction
The system consists of a transmitter, a transmission channel, and a receiver. This section
will describe how each of these elements can be modelled, both conceptually and in Matlab.
2.2.2.1 Transmitter
To construct the transmitter [23], the original information bits should be generated first.
This is achieved by generating a random binary data array.
The binary data array should be converted into decimal format depending on the modu-
lation type ‘Mod type’ of this CM. ‘Mod type’ decides the value of M. To transfer the binary
into decimal, rearrange the data array according to the selected constellation order M first,
which is grouping k bits together and converting the k bits binary to a decimal number,
where k is the number of bits per symbol and 2k = M .
The next step is to map the symbols according to the M-QAM constellation mapping
rule specified in DOCSIS 3.1. The concept of constellation mapping was introduced earlier
in this chapter.
The next step is to allocate the symbols to the assigned sub-carriers. For example, if
Sub-carrier 74 to 81 are assigned to the CM for data transmission, then the CM will activate
Sub-carrier 74 to 81 and put the processed symbols on these sub-carriers. All other sub-
carriers are disabled and are set to be 0.
After assigning the symbols to Sub-carriers, the signal is converted from the frequency
domain to the time domain using an Inverse FFT operation.
25
Figure 2.5 The flow chart showing the signal generation procedure in the CM
In the time domain, a cyclic prefix is added to the front of each symbol to avoid interfer-
ence. This is done by copying the last few time domain samples of the symbol and inserting
them at the beginning of the symbol as a cyclic prefix. A window is applied to the whole
signal to reduce the energy transmitted outside the allocated frequency band, to make the
signal transmission more efficient.
Finally, the signal is transmitted. The whole process is shown in Figure 2.5
2.2.2.2 Channel
When the transmitted signal goes through the transmission channel, it is delayed and
attenuated [24]. As previously discussed, if there are impedance mismatches in the cable
26
Figure 2.6 The flow chart showing the procedure in receiver
plant, it is possible for echoes to be generated. Theoretically, the effect of the channel may
be modelled as convolution between the transmitted signal and a suitably chosen equivalent
filter.
2.2.2.3 Receiver
The receiver in the CMTS is responsible for processing the upstream signal and recovering
the original transmitted data [25]. Once the receiver receives the signal, it will first remove
the CP. Then, an FFT operation is performed to convert the signal from time domain to
frequency domain. Next, the receiver must remove the effect of the transmission channel.
Since convolution in the time domain equates to multiplication in the frequency domain, the
frequency domain signal should be divided by the channel’s frequency response in order to
undo the effect of the channel. Finally, the signal is demodulated (converted back to the
original data bits) by performing the inverse of the constellation mapping operation. The
flow chart of the procedure in receiver is shown in Figure 2.6.
2.2.3 Simultaneous Upstream Transmissions
In a real upstream transmission system, multiple CMs will generally be transmitting at
the same time. Let CM1 be one of the cable modems. The signal processing procedure of
27
Figure 2.7 The basic signal processing progress of one CM
Figure 2.8 The signal produced by one CM
CM1 is studied as an example in this section. Figure 2.7 shows the basic progress used by
CM1 when processing and packaging data.
The original data is an array of digital bits. Take 0 1 1 0 0 0 1 1 for an example. According
to the chosen constellation type, the original data is transferred to decimal values. For
example, assuming QPSK is chosen for CM1 (M=4), then the binary data can be rearranged
into 2-bit chunks. The possible values for these 2-bit chunks are 01, 10, 00, 11, which are
1 2 0 3 in decimal. These numbers are then mapped to symbols according to the QPSK
constellation map. After mapping, the data will be allocated to the assigned sub-carriers.
Assume CM1 is assigned to the first minislot (sub-carrier 74 to 81). All other CMs are
assigned to other minislots. For example, CM5 could be assigned to minislots containing
sub-carriers 90-105. Each CM transmits on only the minislots assigned to it, leaving the
other sub-carriers empty. The transmitted signal from the CM is generated by applying an
IFFT and then adding a cyclic prefix and windowing the signal as previously discussed.
The signal generated by one CM is shown in Figure 2.8 . The data sent out by a cable
modem in time domain is called OFDM Data Block in the figure.
The structure of the upstream communication system was shown in Figure 2.4. The
28
Figure 2.9 The structure of signal sent out by upstream transmitters
signal transmitted through the channel is the sum of all cyclic prefix and data blocks sent
out by all CMs. As Figure 2.9 shows, the data blocks from multiple CMs combine to form
a single OFDM symbol. Note that transmitters are synchronized, so their data blocks and
cyclic prefixes line up in time.
When the CMTS receives the transmitted signal, it will first remove the cyclic prefix
part. Then the demodulator will capture and demodulate one symbol at a time in sequence.
If there is no noise, and no interference, the demodulator will recover all the data sent by all
CMs. In this example, the output of FFT for the sub-carriers 74 to 81 will be exactly the
same as the input of IFFT in CM1. The output of sub-carriers 90 to 105 will be the same
as the input of CM5.
29
3. Chapter3: Effects of Interference on a Single
Sub-carrier
In a practical setting, interference will be introduced into the transmission system. Two
main sources of interferences are considered in this thesis. One is the neighbouring symbols
and the other is self inflicted from the symbol of interest. The two sources of interferences are
referred to as the Inter Symbol Interference (ISI) and the Intra Symbol Interference (IaSI),
respectively. Both have been alluded to in Chapter 1, Section 1.3.4.
The upstream signal is transmitted as a frame consisting of K OFDMA symbols separated
by cyclic prefixes as illustrated in Figure 3.1. The received signal differs from the transmitted
signal in that it contains an echo as shown in Figure 3.2. The echo is shown below the main
path and is the main path scaled in amplitude and delayed by D.
It is assumed a synchronization circuit finds the boundaries of the OFDMA symbols in
the main path. Many such circuits [26] [27] and devices [28] have been discussed in the
literature over the years. These boundaries are shown in Figure 3.2 as red vertical dashed
lines. The demodulation of each symbol begins with the receiver extracting the portion of
the received signal within these boundaries. The extracted signal is the sum of the OFDMA
symbol in the main path plus the portion of the echo that falls in the extraction interval as
Figure 3.1 The transmitted signal in a frame consisting of K OFDMA symbols
30
Figure 3.2 The received signal (The upper plot is the main path; the lower plot is
an echo with delay D, where D is shorter than the length of CP)
Figure 3.3 The received signal (The upper plot is the main path; the lower plot is
an echo with delay D, where D is longer than the length of CP)
shown in Figure 3.2.
Whether or not there is interference depends on whether the length of the cyclic prefix
is longer than the echo’s delay. If the echo’s delay is shorter than the length of the cyclic
prefix, which is the case illustrated in Figure 3.2, the echo, which starts at the beginning of
CP, starts prior to the extraction interval and finishes after the extraction interval. Thus,
the echo spans the extraction interval. However, if the delay is longer than the cyclic prefix,
which is illustrated in Figure 3.3 , the echo does not start prior to the beginning of the
extraction interval, so it does not span the entirety of the extraction interval.
In the first case (Figure 3.2), the transmitter’s pre-equalizer can remove the effect caused
by the echo and the demodulator is able to recover the original signal perfectly. However, in
the second case, the pre-equalizer cannot compensate for the missing segment of the echo.
31
For the second case (Figure 3.3), a piece of the echo is missing from the extracted portion
of the signal. Since the signal is the sum of the main path and the echo, this missing piece for
all intents and purposes, is interference. Since this interference is self inflicted, it is referred
to as Intra Symbol Interference (IaSI). The symbol ’IaSI’ is used to refer to the power in
the self inflicted interference.
Furthermore, in the second case (Figure 3.3), a portion of the echo of the previous
symbol has shifted into the extraction interval. This unwanted signal is also a source of
interference. As this interference is inflicted by another symbol, it is referred to as Inter
Symbol Interference (ISI). The symbol ‘ISI’ is used to refer to the power in the Inter
Symbol Interference. The total interference power is the sum of IaSI and ISI and is
denoted ISITOTAL, where
ISITOTAL = IaSI + ISI; (3.1)
A more detailed explanation of ISI and IaSI is given in Section 3.1.2.
IaSI and ISI are the powers of the interference corrupting the entire OFDMA symbol.
Also of interest are the components of ISI and IaSI that corrupting a single sub-carrier, say
sub-carrier K. The component of ISI corrupt sub-carrier K is denoted ISISC(K). The
component of IaSI corrupting sub-carrier K is denoted IaSISC(K).
The components of ISI and IaSI corrupting sub-carrier K may not be the same as
the components of ISI and IaSI generated by sub-carrier K. Therefore, the components
generated by sub-carrier K are denoted ISISC(K) and IaSISC(K).
The intent of this chapter is to determine how ISISC(K) and IaSISC(K) is distributed
among ISISC(i) and IaSISC(i) for i = 1, 2, . . . , 2048 and also to determine what is the
total interference in ISITOTAL(i) is for i = 74, 75, . . . , 1973.
The system used for the analysis has only one active sub-carrier, which is SC-74. This
sub-carrier is QPSK modulated with random data. The channel has an echo with magnitude
-16dB with respect to the main path. The echo has a delay D = 500 samples, while the CP
has length 256. Since the echo’s delay is longer than the CP, both ISI and IaSI will be
present.
32
In Section 3.1, this system is analysed to compute the portion of the adjacent symbol’s
echo that causes ISI and missing portion of the self echo IaSI. Then, the distributions of
ISISC(74), IaSISC(74) and the ISITOTAL(74) across sub-carriers 1 to 2048, (i.e. ISISC(i),
IaSISC(i), ISITOTAL(i) for i = 1, 2, . . . , 2048) are plotted.
The results of Section 3.1 were obtained from a less than rigorous analysis. To corroborate
the ISI and IaSI obtained in Section 3.1, Section 3.2 provides a second method of computing
the distribution of the total interference in the system. The transmission model used is
the same as that in Section 3.1. This method computes and compares the constellation
points constructed in the receiver to the expected. The Euclidean distance between the
reconstructed and expected constellation points is the magnitude of error. The total power
in the interference is the sum of the square of the magnitude of the error. The distribution
of the total interference is plotted. By carefully comparing the plot generated in Section 3.1
and the plot generated in this section, the ISI and IaSI obtained in Section 3.1 can be
corroborated.
Section 3.3 includes an estimation model. A mathematical method is used to achieve the
same distributions of ISI, IaSI and ISITOTAL as the plots generated in Section 3.1. The
corroborated ISI and IaSI in Section 3.1 is applied to this model.
The ISISC(K) and IaSISC(K) generated by a single sub-carrier K is able to be estimated
by the estimation model built in Section 3.3. In Section 3.4, the transmission model used is
the same as the one built in Section 3.1. However, instead of having only one sub-carrier,
more sub-carriers are enabled and the signal is transmitted with different delay lengths.
Then, in the system, more sub-carriers have ISI and IaSI. For sub-carrier SC-i, ISISC(i)
should be the sum of all ISI generated by all other sub-carriers and IaSISC(i) should be the
sum of all IaSI generated by other sub-carriers. The total interference corrupting in SC-i is
the sum of ISISC(i) and IaSISC(i). This will be applied to the next chapter for final cyclic
prefix length selection model.
33
Figure 3.4 The impulse response of the physical channel linking a CM to the
CMTS
3.1 The Distribution of the Interference Generated by a Single
Sub-carrier
In this section, the distribution of the interference generated by a single sub-carrier among
all other sub-carriers is studied. To be more specific, the effects of the interference generated
by sub-carrier K, which has component ISISC(K), IaSISC(K) and ISITOTAL(K), on the
other sub-carriers are studied. The interference is generated and its distribution is measured
using time-domain simulation. Then, the so found distributions of ISISC(K), IaSISC(K)
and ISITOTAL(K) are plotted. Finally, the effects of the echo’s delay, the echo’s magnitude,
the length of the cyclic prefix and the modulation order are explored.
3.1.1 Channel Model for Physical Plant
The channel is modelled as a main path and an echo [29]. The impulse response of such
a channel is shown in Figure 3.4. This channel is expressed mathematically as:
hC(t) = Amδ(t− τm) + Aeδ(t− τm − τe); (3.2)
where τm is the transport delay of the main path and τe is the excess delay of the echo, which
will be referred to as the echo’s delay. Am is the magnitude of the main path and Ae is the
magnitude of the echo. A block diagram of this channel model is shown in Figure 3.5. The
block diagram in Figure 3.5 indicates the main path signal is received a time of τm after it
is transmitted. The echo is received τe after the main path is received.
The delay τm and amplitude Am are compensated by the synchronization circuit in the
34
Figure 3.5 The block diagram of the physical channel linking a CM to the CMTS
Figure 3.6 The block diagram of the physical channel used in this study (amplitude
and delay of the main path compensated)
receiver [30] and therefore have no effect on the performance of the system. Therefore,
without loss of generality, τm can be set to 0 and Am can be set to 1. This is done to obtain
the channel model used in this study, which is shown in Figure 3.6.
3.1.2 Sources of Interference
The interference of interest in this section is that generated when only one sub-carrier in
the OFDMA symbol has non-zero power. This active sub-carrier is denoted as Sub-carrier
K. An OFDMA symbol with only one active sub-carrier is a pure sinusoid, as shown in
Figure 3.7.
This OFDMA symbol is extended by copying a portion from the end of the symbol and
inserting it at the beginning as shown in Figure 3.8. The piece inserted at the beginning,
which is called a Cyclic Prefix (CP), will be a natural extrapolation of the sinusoid because
the period of the sinusoid is the length of the OFDMA symbol [31].
35
Figure 3.9 The received signal which is the sum of the main path and an echo
(The echo’s delay shorter than the length of CP)
The transmitted signal traverses the channel shown in Figure 3.6 and arrives at the
receiver with an echo. The received signal is illustrated in Figure 3.9. In this case, the
channel is such that the echo’s delay is shorter than the length of the cyclic prefix.
The receiver is synchronized to extract the received signal in the interval between the
two vertical dashed lines in Figure 3.9. This interval, which is referred to as the extraction
interval, is aligned with the OFDMA symbol in the main path.
If the echo’s delay is longer than the length of the cyclic prefix, which is illustrated in
Figure 3.10, the echo in the extraction interval is no longer a complete sinusoid. Conceptually,
the sinusoid can be completed as shown in Figure 3.11, in which two segments are added
to the section of the extraction interval between lines L1 and L2. One segment is chosen to
complete the sinusoid and the other is chosen to make the two segments sum to 0. The black
curve between lines L3 and L4 is the portion of the echo that originated from the original
OFDMA symbol. The red curve between lines L2 and L3 originated from the cyclic prefix.
37
Figure 3.10 The received signal which is the sum of the main path and an echo
(The echo’s delay longer than the length of CP)
Figure 3.11 The echo in the extraction interval been completed by adding a segment
38
Figure 3.12 The diagram of the main path signal and an echo with delay D longer
than CP length
The lower green segment between lines L1 and L2 is not part of the echo and therefore is
not actually present in the real system. It is drawn to complete the sinusoid. To compensate
for the presence of this segment, the upper cyan segment between L1 and L2 is also added.
Since the upper and lower segments sum to zero, nothing has been added. This allows the
echo to be represented as a complete sinusoid plus interference, with the interference being
the upper cyan curve between lines L1 and L2. The power in this interference is denoted
as IaSI, which is short for Intra Symbol Interference. The echo’s delay in unit of samples
is denoted D. The length of the IaSI segment is the distance between L1 and L2, which in
units of samples is D minus the length of the CP in samples.
In the case where the echo’s delay is longer than the length of CP, the echo from the
previous symbol enters the extraction interval as shown in Figure 3.12. As Figure 3.12
shows, since the delay is longer than the CP length, part of the previous symbol will fall
into the extraction interval. This is illustrated in Figure 3.13 , where the dotted magenta
curve between lines L1 and L2 is the portion of the previous symbol’s echo that is shifted
into the extraction interval. Obviously, this portion of the previous symbol’s echo acts as
interference. The power in this interference is denoted as ISI, which is short for Inter Symbol
Interference. The length of the ISI segment is the distance between L1 and L2, which in
units of samples is D minus the length of the CP in samples.
Therefore, two kinds of interference corrupt the extraction interval: IaSI, which comes
from the incomplete self echo, and ISI, which comes from the echo of the previous symbol.
39
Figure 3.13 The echo in the extraction interval been completed by adding a segment
and include the previous symbol’s echo
Both types of interference segments have lengths of D minus CP samples.
The inter symbol interference power is given by the following equation which is taken
from the DOCSIS 3.1 standard.
ISI =(τe − TCP )A2
e
TU; (3.3)
where:
τe is the delay of the echo
TCP is the length of cyclic prefix in µs
Ae is the amplitude of the echo with respect to amplitude of the main path
TU is the duration of the extraction interval in seconds, which is also FFT duration (20 or
40 µs)
The length of the cyclic prefix in unit samples is denoted NCP . The relationship between
the length of the cyclic prefix, the delay and the ISI (power) in unit of samples is given by:
ISI =(D −NCP )A2
e
NFFT
; (3.4)
Using the same approach, an equation for IaSI (power) can be derived with the result:
IaSI =(τe − TCP )A2
e
TU; (3.5)
40
where:
τe is the delay of the echo which is caused by a micro-reflection
TCP is the length of cyclic prefix in µs
Ae is the amplitude of the micro-reflection with respect to amplitude of the main path
TU is the duration of the extraction interval in seconds, which is also FFT duration (20 or
40 µs)
The relationship between the length of the cyclic prefix, the delay and the IaSI (power)
in unit of samples is given by:
IaSI =(D −NCP )A2
e
NFFT
; (3.6)
From (3.4) and (3.6), it is clear that ISI equals IaSI. The reason for this is clear from
Figure 3.13 that shows the length of the IaSI segment is the same as the length of ISI
segment. Since the previous symbol traverses the same channel, it has the same delay and
echo strength. This means the average power of the IaSI segment is equal to the average
power of the ISI segment. The total interference power is the sum of IaSI and ISI, i.e.
ISITOTAL = ISI + IaSI; (3.7)
Since ISI = IaSI; ISITOTAL = 2× ISI; which has
ISITOTAL = 2× (τe − TCP )A2e
TU; (3.8)
where:
τe is the delay of the echo which is caused by a micro-reflection
TCP is the length of cyclic prefix in µs
Ae is the amplitude of the echo with respect to amplitude of the main path
TU is the duration of the extraction interval in seconds, which is also FFT duration (20 or
40 µs)
The ISITOTAL is related to the echo’s delay, the echo’s strength, the length of the cyclic
prefix and the length of the OFDMA symbol in unit of samples by:
ISITOTAL = 2× (D −NCP )A2e
NFFT
; (3.9)
41
Table 3.1 The parameters for the OFDM system used in the simulation
Length of the OFDMA symbol NFFT 2048
Enabled Sub-carrier SC-74
Modulation Type QPSK
Length of Cyclic Prefix NCP 256
Length of Roll-off Period NRP 0
Echo’s Delay Length D 500
Echo’s Magnitude Ae -16dB
3.1.3 Calculation of the Distribution of ISISC(K) and ˜IaSISC(K)
Having identified the sources of ISI and IaSI in the system, the distribution of the
interferences generated by an OFDMA symbol with a single non-zero sub-carrier can be
computed. The approach taken is to use Fourier analysis on the segment of the echo causing
the ISI to translate it from the time domain to the frequency domain. Once in the frequency
domain the distribution of power across sub-carriers is easily computed. Since the nature of
IaSI parallels that of ISI and IaSI is equal to ISI, only one type of interference needs to
be analyzed in this way.
The analysis is done using a MATLAB simulation with the MATLAB function FFT
being used to transform the echo segment causing the ISI into the frequency domain. The
OFDM system model introduced in Section 2.2.2 is in a MATLAB script. Random data
is generated and assigned to OFDMA symbols with cyclic prefixes in the MATLAB script
“OFDM Tx”. The channel, which has a main path and an echo, is constructed in MATLAB
script ”Channel”. It is pointed out that the white Gaussian noise that is normally introduced
in the channel is not modelled here.
The OFDM system is configurable through a set of parameters. The parameters for the
OFDM system used in the simulation are set as shown in Table 3.1. For the purpose of this
study, the non-zero sub-carrier is Sub-carrier 74.
A frame consists of K consecutive symbols. However, only two of the K symbols in this
42
Figure 3.14 The structure of the transmitted signal
Figure 3.15 The received signal with one main path and an echo with delay D and
magnitude Ae
sequence needs to be generated in the simulation. The structure of the signal generated
in the MATLAB simulation is shown in Figure 3.14. As explained earlier, each of the two
symbols have the same non-zero sub-carrier, which is Sub-carrier 74. The sub-carrier in the
two symbols is modulated with independent data.
The main path in the channel is modelled with no delay and a gain of 1. The echo is
modelled with a delay of D samples and a gain Ae. This channel, which is the sum of the
main path and the echo is constructed in MATLAB as a filter with coefficients [1, 0, 0...,
0, Ae], where D − 1 zeros separate the first and last coefficients. The first coefficient is the
gain of the main path, which is 1, and the last coefficient is the gain of the echo, which is
Ae. The received signal is constructed by convolving the transmitted signal with the filter
that models the channel.
At the receiver, the received signal contains a main path and an echo as illustrated in
Figure 3.15. Of interest is the case where D is longer than NCP . In this case the portion
of the echo from the previous symbol is shifted in the extraction interval and causes inter
symbol interference.
The case of interest is demonstrated in Figure 3.16, where the echo for OFDMA Symbol
1 reaches the extraction interval for Symbol 2. The extraction interval for OFDMA Symbol
43
Figure 3.16 The received main path and the echo scaled in unit of samples
2 is highlighted in red and the portion in the echo of the OFDMA Symbol 1 that reaches the
extraction interval has been hatched. Figure 3.16 starts with the first sample of OFDMA
Symbol 1, and ends with the last sample of the echo for Symbol 2. The segment that causes
ISI starts at sample 2×NCP +NFFT and ends at sample D+NCP +NFFT . Therefore, the
interference segment of the echo can be obtained by subtracting the segment of the main
path for OFDMA Symbol 2, that starts at sample 2 × NCP + NFFT and ends at sample
D +NCP +NFFT , from the received signal .
The next step is to take the Fast Fourier Transform of the segment causing the interfer-
ence. This is done by extending this segment with zeros to make its length NFFT . Then,
in the frequency domain, the power of this segment is computed. The computed power
distribution is the ISI distribution generated by Sub-carrier 74, which is referred to as
ISISC(74).
While the computation discussed here was done for Sub-carrier 74, the technique can be
applied to any active sub-carriers. The MATLAB code used for this analysis is included in
Appendix B.
3.1.4 Result
The ISI and IaSI distribution over the whole frequency domain can be plotted using
the technique developed in Section 3.1.3.
With all the parameters set as shown in Table 3.1, the ISI is distributed as illustrated
44
Figure 3.17 ISI distribution with NCP =256, echo delay D=500, echo magnitude
Ae = −16dB and the only non-zero sub-carrier SC-74
in Figure 3.17.
The x-axis of Figure 3.17 is the frequency expressed as sub-carrier number, which starts
at 1 and goes to 2048. The y-axis is ISI shown in dB, i.e. 10 log(ISI/ReferencePower)1.
The vertical red dashed line marks the Sub-carrier 74. The plot shows the interference power
generated by Sub-carrier 74 is concentrated in the vicinity of that sub-carrier, but does reach
all sub-carriers. The interference on Sub-carrier K is a strong function of its distance from
Sub-carrier 74. The distribution is circular in the sense that the power in Sub-carrier 74+K
1The reference power chosen for expressing ISI in dB is the average power of the received symbol after
subtracting the interference. The received signal is the sum of the main path and the echo. Should a piece of
the echo be missing from the extraction interval. The missing piece is replaced for the purpose of calculating
the signal power.
In terms of the constellation, the reference power is the average power of the received constellation in
absence of noise and interference. This received constellation includes the effect of the echo, which will scale
its magnitude and rotate it.
45
Figure 3.18 IaSI distribution with NCP =256, echo delay D=500, echo magnitude
Ae = −16dB and the only non-zero sub-carrier SC-74
is equal to the power in Sub-carrier modulo(2048, 74−K).
The IaSI distribution is shown in Figure 3.18 . It is identical to the distribution of ISI.
The distribution of the total interference power, is calculated in similar fashion and is shown
in Figure 3.19.
3.1.5 Effect of Parameter Values
The factors that affect the distribution of interference are explored in this section. The
effect of changing the length of cyclic prefix, the echo’s delay, the echo’s magnitude as well
as the constellation order are determined by changing one parameter at a time.
3.1.5.1 The Effect of the Length of Cyclic Prefix on ISI
To determine the effect of the length of the cyclic prefix, NCP is changed from 256 to
96 samples. The other parameters remain unchanged, i.e. the echo’s delay D equals 500,
the echo’s magnitude Ae equals −16dB and the modulation type is QPSK. The spectral
46
Figure 3.19 ISITOTAL distribution with NCP =256, echo delay D=500, echo mag-
nitude Ae = −16dB and the only non-zero sub-carrier SC-74
47
Figure 3.20 ISI distributions comparison between the length of the cyclic prefix
NCP = 96 and 256
distribution of the ISI is plotted in Figure 3.20 with a solid line that is magenta in color.
The plot on the right side is a zoomed-in view of the plot on the left side. The dashed blue
curve is the ISI distribution plotted in Figure 3.17, in Section 3.1.4 for the length of cyclic
prefix NCP = 256. The solid magenta curve is the ISI distribution with the length of the
cyclic prefix being 96.
It can be seen from the zoomed-in plot in Figure 3.20, that the ISI at SC-74 for NCP =
256 is about 4dB less than the ISI for NCP = 96. The difference in the ISI at the other
sub-carriers decreases with the distance from Sub-carrier 74.
The shorter CP length produces larger ISI in the vicinity of sub-carrier generating the
interference, which is Sub-carrier 74. The reason is straight forward. For the shorter length
of the cyclic prefix, a larger portion of the previous symbol’s echo shifts into the extraction
interval, thus increasing the interference. In fact, this is the rationale for the development
of equation (3.4).
48
Figure 3.21 ISI distributions comparison between the echo’s delay D= 500 and
1000
3.1.5.2 The Effect of the Echo’s Delay on ISI
To determine the effect of the echo’s delay, it is changed from D = 500 to 1000 samples
and the length of the cyclic prefix is changed back to 256. All other parameters remain
unchanged, i.e. the echo’s magnitude Ae equals −16dB and the modulation type is QPSK.
The spectral distribution of the ISI is plotted in Figure 3.21 with a solid magenta line. The
plot on the right side is a zoomed-in view of the plot on the left side. Again, the dashed blue
curve is the ISI distribution plotted in Figure 3.17, in Section 3.1.4 for the echo’s delay D
= 500. The solid magenta curve is the ISI distribution with the D = 1000.
It can be seen from the zoomed-in plot in Figure 3.21 that the ISI at Sub-carrier 74 for
D = 500 is about 11dB less than the ISI for D = 1000. The difference in the ISI at other
sub-carrier decreases with the distance from Sub-carrier 74.
The echoes with longer delays produce larger ISI in the vicinity of the sub-carrier gen-
erating the interference, which is Sub-carrier 74. The reason is also straight forward. For
the echo with a longer delay, a larger portion of the previous symbol’s echo shifts into the
extraction interval, thus increasing the interference.
49
Figure 3.22 ISI distributions comparison between the echo’s magnitude Ae =
−16dB and −35dB
3.1.5.3 The Effect of the Echo’s Magnitude on ISI
To determine the effect of the echo’s magnitude, it is changed from Ae = −16dB to
−35dB and the echo’s delay is changed back to 500 samples. All other parameters remain
unchanged, i.e. the length of the cyclic prefix is 256 and the modulation type is QPSK.
The spectral distribution of the ISI is plotted in Figure 3.22 with a solid line in the color
of magenta. The plot on the right side is a zoomed-in view of the plot on the left side.
The dotted blue curve is the ISI distribution plotted in Figure 3.17, in Section 3.1.4 for an
echo with magnitude Ae = −16dB, which is measured relative to the main path. The solid
magenta curve is the ISI distribution with Ae = −35dB.
It can be seen from the zoomed-in plot in Figure 3.22 that at Sub-carrier 74, the ISI
caused by the echo with magnitude −16dB is −33.11dB. The ISI caused by the echo with
magnitude −35dB is −53.25dB. The ISI on all sub-carriers seems to be proportional to the
echo strength. The ISI distribution for the stronger echo of −16dB, is about 20dB higher
than the ISI distribution for the weaker echo of Ae=−35dB across the entire spectrum.
Of note, the change in ISI does not exactly track the change in Ae. The echo’s magnitude
50
Ae is changed by 19dB (from −16dB to −35dB), while the ISI is changed by 20.14dB. The
reason for the difference is explained below.
Mathematically, ISI expressed in dB is computed with (3.10).
ISIindB = 10 log10
ISI
Pref; (3.10)
where Pref is the reference power, which is the power in the sum of the main path and
the echo. Obviously, the reference power will depend on the amplitude of the echo. The
difference in between ISI in dB for Ae = −16dB and the ISI in dB for Ae = −35dB is
denoted ISIDIFF . It is given by
ISIDIFF = 10 log10
ISI16Pref16
− 10 log10
ISI35Pref35
; (3.11)
where ISI16 represents the ISI (power) for Ae = −16dB and ISI35 represents the ISI
(power) for Ae = −35dB. The reference powers for echoes’ magnitudes −16dB and −35dB
are denoted Pref16 and Pref35 respectively.
Equation ( 3.11) can be written as:
ISIDIFF = 10 log10(
ISI16Pref16ISI35Pref35
); (3.12)
ISIDIFF = 10 log10(ISI16ISI35Pref35Pref16
); (3.13)
which can be simplified to:
ISIDIFF = 10 log10 ISI16 − 10 log10 ISI35 + 10 log10 Pref35 − 10 log10 Pref16; (3.14)
ISIDIFF = 19dB + 10 log10 Pref35 − 10 log10 Pref16; (3.15)
Since ISIDIFF read from Figure 3.22 is 20dB,
10 log10 Pref35 − 10 log10 Pref16 = 1dB; (3.16)
This means the echo adds destructively to the main path.
51
Figure 3.23 ISI distributions comparison between QPSK and 16-QAM systems
3.1.5.4 The Effect of the Modulation Order on ISI
To determine the effect of the modulation order on the ISI, the modulation type is
changed from QPSK to 16-QAM and the echo’s magnitude Ae is changed back to −16dB.
All other parameters remain unchanged, i.e. the length of the cyclic prefix is 256, the echo’s
delay is 500 samples. The spectral distribution of the ISI is plotted in Figure 3.23 with a
solid line that is magenta in color. The plot on the right side is a zoomed-in view of the
plot on the left side. The dashed blue curve is the ISI distribution plotted in Figure 3.17,
in Section 3.1.4 for the constellation type of QPSK. The solid magenta curve is the ISI
distribution with the constellation type being QPSK.
It can be seen from the zoomed-in plot in Figure 3.23, that the distribution of ISI
across the entire frequency spectrum for QPSK is almost equal to the distribution of ISI
for 16-QAM. The ISI at Sub-carrier 74 for both QPSK and 16-QAM plot are about -34dB.
Therefore, the constellation order will not have a significant effect on the distribution of
ISI across the entire frequency spectrum.
52
3.1.6 Conclusion
From observations made in Section 3.1.5.1, Section 3.1.5.2, Section 3.1.5.3 and Sec-
tion 3.1.5.4, it can be concluded that the length of the cyclic prefix and the echo’s delay
affect the distribution of the ISI most severely at frequencies near the sub-carrier causing
the ISI. The echo’s magnitude affects the ISI across the entire frequency spectrum and is
nearly proportional to the echo’s strength. The constellation type doesn’t have a significant
effect on the ISI.
Since Intra Symbol Interference has the same characteristics and value as the Inter Symbol
Interference, its spectral distribution will be the same. Therefore, the total interference, i.e.
ISITOTAL, which is the sum of IaSI and ISI, will be twice that of ISI.
3.2 Corroboration of the Distribution of the Interference Gener-
ated by a Single Sub-carrier
In Section 3.1, the distribution of the interference generated by a single sub-carrier was
analyzed. In this section an independent simulation that is based on modelling the decision
variable, i.e. the constellation points constructed from the received signal with interference
removed is constructed for the purpose of corroborating the results of Section 3.1. The
corroboration is done by analyzing the constellation points constructed from the received
signal first to find the error caused by interference. The average power in the error is
computed and compared with the total ISI obtained from Section 3.1.
3.2.1 The Distribution of ISITOTAL(K)
The distribution of ISITOTAL(K) is found by modulating the sub-carriers using QPSK.
The constellation map for QPSK is illustrated in Figure 3.24. The four points, 1 + j, 1− j,
−1 + j, −1− j, (blue) are the constellation of the transmitted signal.
The channel consists of a main path and an echo. The echo doesn’t cause interference
if its delay is shorter than the length of the cyclic prefix. However, even without causing
interference, the echo will affect the constellation constructed from the received signal. The
53
Figure 3.24 The transmitted constellation of QPSK
echo can add constructively or destructively to the main path signal, causing the constellation
to scale up or down. In addition to scaling, depending on the phase of the echo with respect
to the main path signal, the echo can cause a rotation in the constellation. The amount of
rotation depends on the phase of the echo with respect to the main path signal.
The mathematical explanation is given below. Assume only one OFDMA symbol is
transmitted through the system and that the transmitted symbol is a single sub-carrier (i.e.
a single sinusoid) with amplitude 1. The transmitted signal for constellation point −1− j1
can be expressed as
Transmitted Signal = (−1− j1)ejω0t; (3.17)
where ω0 is the frequency of the single active sub-carrier.
Then, at the receiver the received signal should be
Received Signal = (−1− j1)ejω0t + Ae(−1− j1)ejω0(t−τ); (3.18)
where Ae is the echo’s magnitude and τ is the echo’s delay with respect to the main path.
54
Equation 3.18 can be rewritten as
Received Signal = (−1− j1)ejω0t + Aee−jω0τ (−1− j1)ejω0t
= (1 + Aee−jω0τ )(−1− j1)ejω0t
= Arxej(ω0t+θ); (3.19)
where the amplitude of the received signal Arx is given by
Arx =√
((1 + Aee−jω0τ )(−1− j1))2
=√
2√
1 + 2Ae cos(ω0τ) + A2e; (3.20)
and the expression of the phase shift θ is
θ = angle((1 + Aee−jω0τ )(−1− j1))
= angle(−(1 + Ae(sinω0τ + cosω0τ))− j1(1 + Ae(sinω0τ − cosω0τ)))
= tan−11 + Ae(sinω0τ − cosω0τ)
1 + Ae(sinω0τ + cosω0τ). (3.21)
The factor of√
2 in Equation 3.20 is the magnitude of the transmitted constellation
point, which is | − 1− j1|. For QPSK all transmitted constellation points have a magnitude
of√
2, so Arx does not depend on the constellation point transmitted.
The effect of the echo on the received constellation map is illustrated in Figure 3.25. The
triangles (green) mark the received constellation points in the absence of any noise or other
distortion. Clearly, it is a scaled and rotated version of the transmitted constellation. From
Figure 3.25, it can be seen that each point in the constellation is rotated by the same amount
θ. Since the constellation of Figure 3.25 has no noise or interference, it forms the reference
constellation for the receiver.
In the event that the echo’s delay is longer than the length of the cyclic prefix, interference
corrupts the reference constellation. This interference causes the decision variable to move
off the reference constellation. The effect of the interference on the sub-carrier that was
transmitted with an amplitude −1 − j1 (i.e. constellation point (−1, −1), is illustrated in
Figure 3.26. At the receiver, the demodulation produces a decision variable which is an
55
Figure 3.25 The transmitted constellation and the reference constellation of QPSK
Figure 3.26 The transmitted constellation, the reference constellation and the re-
ceived constellation of QPSK
56
estimation of the transmitted constellation point. The decision variable is represented by
the diamond mark (red). The interference causes the decision variable (the diamond) in the
receiver to deviate from the reference point (the triangle).
The magnitude and phase of the decision variables depend on which of the four constel-
lation points that was sent in the previous symbol. Only one of these four points is shown
in Figure 3.9. All constellation points will be affected in a similar fashion.
Since no noise has been added to the signal, the error in the decision variable is caused
entirely by ISI and IaSI. Then, the power in the total interference can be computed
by summing the power of the differences between the received decision variables and the
associated reference constellation points. For the purpose of expressing the total interference
in dB, the power used for the reference is chosen to be the average power of the reference
constellation.
Having identified the total interference power in the system, the distribution of the total
interference generated by an OFDMA symbol with a single non-zero sub-carrier can be
computed. The analysis is done using a MATLAB simulation by tracking the decision
variables for all of the OFDMA sub-carriers at the demodulator. Note that the expected
(reference) decision variable for the sub-carriers which had no transmitted data is 0. In other
words, any received decision variable on those sub-carriers is considered as interference. The
OFDM system model used in Section 3.1.3 was modified and then modeled in a MATLAB
script. Random data is generated and assigned to OFDMA symbols with cyclic prefixes in
the MATLAB script “OFDM Tx”. The channel, which has a main path and an echo, is
constructed in MATLAB script“Channel”. The demodulation that is done in the receiver is
constructed in MATLAB script “OFDM Rx”. (see Appendix C for a complete listing of the
Matlab code)
The OFDM system is configurable through a set of parameters. The parameters for the
OFDM system used in the simulation are set as shown in Table 3.2. For the purpose of this
study, the non-zero sub-carrier is Sub-carrier 74.
As in Section 3.1.3, only two OFDMA symbols are constructed in the simulation. As
57
Table 3.2 The parameters for the OFDM system used in the corroboration sim-
ulation
Length of the OFDMA symbol NFFT 2048
Enabled Sub-carrier SC-74
Modulation Type QPSK
Length of Cyclic Prefix NCP 256
Length of Roll-off Period NRP 0
Echo’s Delay Length D 500
Echo’s Magnitude Ae -16dB
explained earlier, each of the two symbols have the same non-zero sub-carrier, which is
Sub-carrier 74. The sub-carrier is modulated with independent data in the two symbols.
At the receiver, the received signal consists of the main path and the echo. Because the
echo’s delay is longer than the length of the cyclic prefix in this simulation, part of the echo
of the second OFDMA symbol is missing which causes IaSI, and part of the echo of the first
OFDMA symbol is extracted in the demodulation of the second OFDMA symbol. The first
symbol’s echo (i.e. the preceding symbol’s echo) that falls in the extraction interval is the
inter symbol interference, whose power has been denoted ISI. Therefore, the demodulation
of the second OFDMA symbol can be used to study the distribution of the total interference.
The decision variables constructed from the second OFDMA symbol received (i.e. symbol
of interest) are stored in a variable “rx info” in the MATLAB script.
The next step is to identify the reference constellation. The reference constellation points
are constructed from the OFDMA symbol by taking into account the effect of the echo.
The reference constellation points are generated using a reference channel with an echo
that has the same strength but a shorter delay than the cyclic prefix length (i.e. Dref <
NCP ). The same signal is transmitted through this reference channel. At the receiver,
the demodulator constructs the received reference constellation points, which are stored in
variable “rx info ref” in the MATLAB script.
58
Therefore, the total interference power of Sub-carrier 74 can be computed with:
ISITOTAL(74) =
Numof ConstellationPoints∑i=1
|rx−info(i)− rx−info−ref(i)|2 (3.22)
In units of dB, the total interference is given by:
ISITOTAL(74)(dB) = 10 log10
ISITOTAL(74)
Reference−Power(3.23)
where the reference power at the denominator is the total power of the received reference
constellation points.
Reference−Power =
Numof ConstellationPoints∑i=1
|rx−info−ref(i)|2; (3.24)
The main MATLAB script of the simulation is included in Appendix C.
3.2.2 Result
The ISITOTAL distribution over the whole frequency domain can be plotted using the
corroboration model developed in Section 3.2.1. It is compared with the distribution of the
total interference obtained from the simulation model introduced in Section 3.1.
All parameters are set as they were for the simulation in Section 3.1. These parameters
are shown in Table 3.3. The distribution of the total interference generated by a single
non-zero sub-carrier, SC-74, is illustrated in Figure 3.27. The x-axis of Figure 3.27 is the
frequency expressed as sub-carrier number, which starts at 1 and ends at 2048. The y-axis
is ISITOTAL in dB. The vertical dashed line (red) marks position of the Sub-carrier 74. The
solid curve (magenta) represents the distribution of ISITOTAL generated by the simulation
model of Section 3.1. The dashed curve (blue) is the distribution of ISITOTAL from the
simulation model of Section 3.2, which was constructed to the corroborate the model of
Section 3.1. The plot on the right side is a zoomed-in view Sub-carrier 74.
It can be seen from the zoomed-in plot in Figure 3.27, that the distribution of ISITOTAL
across the entire frequency spectrum from the model of this section is almost equal to the
distribution of ISITOTAL from the model of Section 3.1. The power distributions in the
vicinity of Sub-carrier 74 also match very well.
59
Figure 3.27 Distribution of ISITOTAL comparing the results of simulation model to
corroboration model for NCP=256, echo’s delay D=500, Echo’s mag-
nitude Ae = −16dB, QPSK modulation type and a single non-zero
sub-carrier, SC-74.
Left: Full frequency range
Right: Zoomed on Sub-carrier 74
Table 3.3 The parameters set for the OFDM system in the corroboration model
Length of the OFDMA symbol NFFT 2048
Enabled Sub-carrier SC-74
Modulation Type QPSK
Length of Cyclic Prefix NCP 256
Length of Roll-off Period NRP 0
Echo’s Delay Length D 500
Echo’s Magnitude Ae -16dB
60
Figure 3.28 Distribution of ISITOTAL comparing the results of simulation model
to corroboration model for NCP=96, echo’s delay D=500, Echo’s mag-
nitude Ae = −16dB, QPSK modulation type and a single non-zero
sub-carrier, SC-74.
3.2.3 Effect of Parameter Values
In Section 3.1.5, the effects of changing the length of cyclic prefix, the echo’s delay, the
echo’s magnitude as well as the constellation order on the distribution of ISI are explored.
To corroborate the effects of these factors concluded in Section 3.1.5 are right, in this section
the effects of these factors on ISITOTAL are determined by changing one parameter at a time.
3.2.3.1 Effect of the Length of Cyclic Prefix
The effect of the length of the cyclic prefix on the ISITOTAL is determined using the
model of this section by changing NCP from 256 to 96 samples. The other parameters remain
unchanged, i.e. the echo’s delay D equals 500, the echo’s magnitude Ae equals −16dB and
the modulation type is QPSK. The spectral distributions of the ISITOTAL generated by the
simulation model of Section 3.1 and 3.2 are plotted in Figure 3.28.
The solid curve (magenta) represents the distribution of ISITOTAL computed from the
simulation model in Section 3.1. The dashed curve (blue) is the distribution of ISITOTAL
61
generated by the constellation simulation model of this section. The plot on the right side
is a zoomed-in view of Sub-carrier 74.
It can be seen from the zoomed-in plot in Figure 3.28, that the curve generated from the
simulation of this section agrees very well with the curve generated in Section 3.1 when the
length of the cyclic prefix has length 96. Therefore, it can be concluded that model works
well for the cyclic prefixes of difference lengths.
3.2.3.2 Effect of the Echo’s Delay
The effect of the echo’s delay, was determined through simulation in Section 3.1. That
effect is corroborated here by computing the distribution of ISITOTAL using the constellation
based simulation method of this section. The echo’s delay D is changed from 500 to 1000
samples and the length of the cyclic prefix is changed back to 256 as they were in Section 3.1.
All other parameters remain unchanged, i.e. the echo’s magnitude Ae equals −16dB and
the modulation type is QPSK. The spectral distributions of the ISITOTAL generated by the
simulation model of Section 3.1 and the constellation based simulation in this section are
plotted in Figure 3.29.
The solid curve (magenta) represents the distribution of ISITOTAL generated by the
simulation model of Section 3.1. The dashed curve (blue) is the distribution of ISITOTAL
generated by the constellation based simulation. The plot on the right side is a zoomed-in
view of Sub-carrier 74.
It can be seen from the zoomed-in plot in Figure 3.29, that with the change of the echo’s
delay, the distribution of ISITOTAL across the entire frequency spectrum from the simulation
model fits the distribution of ISITOTAL from the corroboration model very well. Therefore,
it can be concluded that both models are accurate over a range of delays.
3.2.3.3 Effect of the Echo’s Magnitude
The constellation based simulation is used to corroborate the accuracy of the simulation
model of Section 3.1, when the echo’s magnitude Ae is changed from −16dB to −35dB and
62
Figure 3.29 Distribution of ISITOTAL comparing the results of simulation model
to corroboration model for NCP=256, echo’s delay D=1000, Echo’s
magnitude Ae = −16dB, QPSK modulation type and a single non-zero
sub-carrier, SC-74.
the echo’s delay is changed back to 500 samples. All other parameters remain unchanged,
i.e. the length of the cyclic prefix is 256 and the modulation type is QPSK. The spectral
distributions of the ISITOTAL generated by the simulation model of Section 3.1 and the
constellation based simulation in this section are plotted in Figure 3.30.
The solid curve (magenta) represents the distribution of ISITOTAL generated by the
simulation model in Section 3.1. The dashed curve (blue) is the distribution of ISITOTAL
generated by the constellation based simulation. The plot on the right side is a zoomed-in
view of the plot on the left side.
It can be seen from the zoomed-in plot in Figure 3.30, that with the change of the echo’s
magnitude, the distributions of ISITOTAL across the entire frequency spectrum from the
simulation model in Section 3.1 is almost equal to the distribution of ISITOTAL from the
constellation based simulation. Therefore, it can be concluded that both models are accurate
over a range of echo strengths.
63
Figure 3.30 Distribution of ISITOTAL comparing the results of simulation model to
corroboration model for NCP=256, echo’s delay D=500, Echo’s mag-
nitude Ae = −35dB, QPSK modulation type and a single non-zero
sub-carrier, SC-74.
3.2.3.4 Effect of the Modulation Order
The constellation based simulation is used to corroborate the accuracy of the simulation
model of Section 3.1 when the modulation type is changed from QPSK to 16-QAM. The
echo’s magnitude Ae is changed back to −16dB. All other parameters remain unchanged,
i.e. the length of the cyclic prefix is 256, the echo’s delay is 500 samples. The spectral
distributions of the ISITOTAL generated by the simulation model in Section 3.1 and the
constellation based simulation are plotted in Figure 3.31.
The solid curve (magenta) represents the distribution of ISITOTAL is generated by the
simulation model in Section 3.1. The dashed curve (blue) is the distribution of ISITOTAL
generated by the constellation based simulation in this section. The plot on the right side is
a zoomed-in view of Sub-carrier 74.
It can be seen from the zoomed-in plot in Figure 3.31, that with the change of the
constellation types, the distributions of ISITOTAL across the entire frequency spectrum from
64
Figure 3.31 Distribution of ISITOTAL comparing the results of simulation model to
corroboration model for NCP=256, echo’s delay D=500, Echo’s mag-
nitude Ae = −16dB, 16-QAM modulation type and a single non-zero
sub-carrier, SC-74.
the simulation model of Section 3.1 is almost equal to the distribution of ISITOTAL from the
constellation based simulation. Therefore, it can be concluded that both models are accurate
over a range of constellation orders.
3.2.4 Conclusion
From observations made in Section 3.2.3.1, Section 3.2.3.2, Section 3.2.3.3 and Sec-
tion 3.2.3.4, where comparisons between the simulation model in Section 3.1 and the con-
stellation based simulation in this section are made, it can be concluded that the two models
agree over a wide range of parameter values.
Therefore, the analysis of the effects of various parameters on the interference in the
system presented in Section 3.1 has been corroborated. The identified and corroborated
interference sources will be be included in the ISI estimation model in the next section.
65
3.3 Convolution Model for the Interference
The distribution of the interference generated by a single sub-carrier was analyzed in
Section 3.1 and corroborated in Section 3.2. In this section, yet another model is developed
and is analyzed to obtain estimates of the distribution of the interference generated by a single
sub-carrier. This model differs from the two previous models in that it is mathematically-
based rather than simulation-based. The goal is to develop an equation or set of equations
which can be used to predict the amount and distribution of interference in a system, given
estimates of the echo delay and strength. The model developed in this section involves the
convolution of the DFT of a symbol with the DFT of a mask and so it is referred to as the
convolution model.
The model is then used to find the aggregate interference on any one sub-carrier when all
the sub-carriers are “on”. The aggregate interference in simply the sum of the interferences
from all the “on” sub-carriers.
As explained in Section3.1.2, the nature of IaSI parallels that of ISI so only one type
of the interferences needs to be analyzed. It is ISI that is studied in this Section. The
principles that underpin the “convolution” model are explained in Section 3.3.1.
Again, the accuracy of the model developed in this section is corroborated by computing
the results to those obtained with the models developed in Section 3.1 and Section 3.2.
3.3.1 Convolution Based Model
As before, the channel considered in this section consists of a main path and an echo.
The case of interest here is where the echo’s delay is longer than the length of cyclic prefix, as
illustrated in Figure 3.32. In this case, part of the previous OFDMA symbol will be shifted
into the extraction interval, which becomes Inter Symbol Interference.
A frame consists of K consecutive symbols, each with its own extraction interval. How-
ever, only the extraction interval for one symbol needs to be explored in this estimation
model. Without loss of generality, the extraction interval used in the analysis is that of
Symbol 2. Figure 3.32 shows the extraction interval for Symbol 2, which is highlighted with
66
Figure 3.32 The diagram of the main path signal and an echo with delay D longer
than CP length
Figure 3.33 The signal in extraction interval for OFDMA Symbol 2
a rectangular box in red. The received signal is the sum of the main path and the echoes.
The main path and the strongest echo are shown as separate component in Figure 3.32.
Figure 3.33 is a zoomed in view of the extraction interval of interest. The interval starts
with the first sample of Symbol 2 that arrives via the main path and ends with the last
sample of Symbol 2 arriving via the main path. The symbol length, which is also the length
of the extraction interval, is NFFT . Figure 3.33 illustrates that part of OFDMA Symbol 1’s
echo reaches the extraction interval for Symbol 2. This segment of Symbol 1’s echo generates
ISI. This ISI segment corrupts the first D −NCP samples of the extraction interval.
The effect of this ISI segment is analyzed using the principle of superposition. The ISI
segment corrupting the first D−NCP samples in the extraction interval is isolated and then
its DFT is computed. The segment is isolated through a series of operations described below.
67
Figure 3.34 Top Plot: The echo portion in the extraction interval;
Bottom Plot: OFDMA Symbol 1..
Figure 3.35 The structure of the extracting mask designed to extract the ISI seg-
ment
The echo segment from Symbol 1 that causes ISI, which is labelled “ISI Segment Echo
1” in Figure 3.34, is superimposed on the first D−NCP samples of Symbol 2. The task at
hand is to isolate the ISI segment which can be done quite easily using OFDMA Symbol 1.
As Figure 3.34 shows, the last D −NCP samples in OFDMA Symbol 1 become the ISI
segment. In fact the ISI segment is the segment multiplied by Ae. The segment can be
isolated by multiplying Symbol 1 by a mask that is zero for the first NFFT − (D − NCP )
samples and is one for remaining D − NCP samples. Such an isolating mask is shown in
Figure 3.35. The total length of the mask is NFFT , the same as the length of the OFDMA
symbol. The mask expressed in MATLAB is given by:
mask = [zeros(1, NFFT − (D −NCP )), ones(1, D −NCP )]; (3.25)
Mathematically isolation is achieved by:
ISIisolation[n] = Ae × xsym[n]×mask[n], 1 ≤ n ≤ NFFT ; (3.26)
68
Figure 3.36 Apply circular shift to the OFDMA Symbol 1
where xsym[n] represents the time domain samples in the OFDMA Symbol 1.
The problem is the isolated segment is located in the last D−NCP of the NFFT samples
of Symbol 1, but actually resides in the first D − NCP samples of Symbol 2. This segment
can be moved to its appropriate location by performing a circular right shift of D−NCP (or
the left shift by NFFT − (D −NCP )), which is illustrated in Figure 3.36.
The ISI segment in the appropriate location is denoted ISIcircshift, which can be ex-
pressed in loose terms as:
ISIcircshift[n] = (Ae × circshift(xsym ×mask)by(D −NCP ))[n],
1 ≤ n ≤ NFFT ; (3.27)
The distribution of the ISI in the frequency domain, which is denoted ISIseg, can be
obtained by taking the DFT of ISIcircshift[n].
ISIseg(k) =
NFFT∑n=1
ISIcircshift[n]e−j 2πnk
NFFT , 1 ≤ k ≤ NFFT ; (3.28)
A circular shift to the right by D −NCP samples in the time domain is a multiplication by
e−j 2πk(D−NCP )
NFFT in the frequency domain. Therefore,
ISIseg(k) = Ae × e−j 2πk(D−NCP )
NFFT
NFFT∑n=1
xsym[n]×mask[n]e−j 2πnk
NFFT ,
1 ≤ k ≤ NFFT ; (3.29)
69
Figure 3.37 Transfer the extracting mask from time domain to frequency domain;
Left side: Extracting mask in time domain;
Right side: Extracting mask in frequency domain.
Since argument of the DFT in ( 3.29) is the product of two time domain functions, the
result is the circular convolution [32] of the two DFTs taken separately.
The result expressed in terms of a MATLAB command is
ISIseg(k) = Aee−j 2πk(D−NCP )
NFFT cconv(DFT{xsym[n]
},DFT
{mask[n]
}, NFFT ),
1 ≤ k ≤ NFFT ; (3.30)
where the MATLAB command “cconv” executes the circular convolution of DFT{xsym[n]
}and DFT
{mask[n]
}. The length of the resulted array is NFFT .
The DFT of the mask is given by:
DFT{mask[n]
}=
NFFT∑n=1
mask[n]e−j 2πnk
NFFT , 1 ≤ k ≤ NFFT ; (3.31)
The plot on the left side in Figure 3.37 shows the shape of the isolating mask in time
domain. The plot on the right is its Discrete Fast Fourier Transform.
The next step is to identify the mathematical expression for
DFT{xsym[n]
}. The OFDMA Symbol 1 in frequency domain is illustrated in Figure 3.38.
Sub-carrier 74 is used for signal transmission. In MATLAB syntax, the expression for
OFDMA Symbol 1 in frequency domain is given by:
DFT{xsym[n]
}= [zeros(1, NSC − 1), ej2πα, zeros(1, NFFT −NSC)]; (3.32)
70
Figure 3.38 The OFDMA Symbol 1 in frequency domain
where NSC represents the number of the sub-carrier used for transmission. In this model,
NSC = 74. The value of the sample at Sub-carrier 74 is a complex number with magnitude
1 and a random phase α, which is mathematically expressed as ej2πα.
The power of the ISI segment is given by:
ISI(k) = ISI2seg(k); 1 ≤ k ≤ NFFT ; (3.33)
where ISIseg(k) is computed from ( 3.30).
In the units of dB, the ISI(k) is:
ISI(k) dB = 10 log10
ISI(k)
Reference−Power; (3.34)
where Reference−Power is the total received power including the extrapolated echo of
Symbol 2 but not the echo segment from Symbol 1. Since the amplitude of the transmitted
signal can be expressed mathematically as ej2πα. The amplitude of the received signal (with
the echo extrapolated) is:
Amplitude of the Received Signal = ej2πα + Aeej2π(α+θ); (3.35)
where Ae is the magnitude and 2πθ is the phase of the echo with respect to the main path
signal.
Since the amplitude of the received signal given by ( 3.35) does not include the ISI
portion of Symbol 2’s echo, the amplitude given by ( 3.35)is also the amplitude of the
reference signal.
Amplitude of the Reference Signal = ej2πα + Aeej2π(α+θ); (3.36)
71
Figure 3.39 The largest case: when the echo is in phase with respect to the signal
in the main path
Clearly, the amplitude of the reference signal depends on the amplitude and phase of the
echo. It falls between 1 + Ae and 1− Ae.
The largest amplitude results when the echo is in phase with respect to the signal in the
main path, as illustrated in Figure 3.39. In this case, the reference signal has power:
Reference−Powerlargest = (1 + Ae)2; (3.37)
The smallest amplitude results when the echo is 180 degree out of phase with respect to the
signal in the main path, as illustrated in Figure 3.40. In this case, the reference signal has
power:
Reference−Powersmallest = (1− Ae)2; (3.38)
The average power is computed based on the phase of the echo being uniformly distributed
between 0 and 2π. It can be shown the average power in the reference signal is given by:
Reference−Powerave = 1 + A2e; (3.39)
These three different Reference−Power values were used to compute ISI in dB. The
distributions of ISI for the three cases will be included in the next section.
72
Figure 3.40 The smallest case: when the echo is 180 degree out of phase with respect
to the signal in the main path
Table 3.4 The parameters simulated for the convolution model
Length of the OFDMA symbol NFFT 2048
Enabled Sub-carrier SC-74
Length of Cyclic Prefix NCP 256
Echo’s Delay Length D 500
Echo’s Magnitude Ae -16dB
3.3.2 Results
In this section, the distribution of ISI over the whole frequency domain is plotted using
the convolution model developed in Section 3.3.1. Three cases are considered: one when the
reference power is as large as possible, one when the reference power is as small as possible
and one when the reference power is average. The three cases are compared respectively, with
the distribution of the ISI obtained from the simulation model introduced in Section 3.1.
All parameters are set as they were for the simulation in Section 3.1. These parameters
are shown in Table 3.4. For the purpose of this study, the single non-zero sub-carrier is
Sub-carrier 74. Since it has been established that the modulation order will not affect the
distribution of interference, it is not a parameter in the convolution model.
The distribution of ISI when the reference power is the largest possible, which is referred
73
Figure 3.41 Distribution of ISI for the largest case. Comparing the results of sim-
ulation model to convolution model for NCP=256, echo’s delay D=500,
Echo’s magnitude Ae = −16dBand a single non-zero sub-carrier, SC-
74.
Left: Full frequency range
Right: Zoomed on Sub-carrier 74
to as “the largest case” is illustrated in Figure 3.41. The x-axis of Figure 3.41 is frequency
expressed in terms of sub-carrier number, which starts at 1 and ends at 2048. The y-axis is
ISI in dB. The vertical dashed line (red) marks position of the Sub-carrier 74. The solid
curve (magenta) represents the distribution of ISI generated by the simulation model of
Section 3.1. The dashed curve (blue) is the distribution of ISI for the largest case from
the convolution model of Section 3.3. The plot on the right side is a zoomed-in view of
Sub-carrier 74.
It can be seen from the zoomed-in plot in Figure 3.41, that the distribution of ISI across
the entire frequency spectrum from the model of Section 3.1 is larger than the distribution
of ISI from the convolution model (the dashed curve). This is expected when the reference
power for the convolution model uses the largest possible value. The ISI in dB is the ratio
of the ISI which is the numerator, and the reference power, which is the denominator.
74
Figure 3.42 Distribution of ISI for the smallest case. Comparing the results of
simulation model to convolution model.
Left: Full frequency range
Right: Zoomed on Sub-carrier 74
Therefore, the larger reference power is, the smaller ISI in dB will be. In “the largest case”,
the reference power uses the largest possible value, which yields a lower bound on the ISI
in dB.
The distribution of ISI when the reference power is the smallest possible, which is
referred to as “the smallest case”, is illustrated in Figure 3.42. The solid curve (magenta)
represents the distribution of ISI generated by the simulation model of Section 3.1. The
dashed curve (blue) is the distribution of ISI for the smallest case from the convolution
model of Section 3.3. The plot on the right side is a zoomed-in view of Sub-carrier 74.
From the zoomed-in plot in Figure 3.42, it can be seen that the distribution of ISI across
the entire frequency spectrum from the model of Section 3.1 is smaller than the distribution
of ISI from the convolution model (the dashed curve) using the smallest possible amplitude
reference power. As discussed for “the largest case”, the ISI in dB is the ratio of the ISI
which is the numerator, and the reference power, which is the denominator. Therefore, the
smaller reference power is, the larger ISI in dB will be. In “the smallest case”, the reference
75
Figure 3.43 Distribution of ISI for the average case. Comparing the results of
simulation model to convolution model.
Left: Full frequency range
Right: Zoomed on Sub-carrier 74
power uses the smallest possible value, which yields a upper bound on the ISI in dB.
All the possible distributions of ISI must be between the distributions of “the largest
case” and the “the smallest case”.
The distribution of ISI when the power in reference signal is average, which is referred
to as “the average case”, is illustrated in Figure 3.43. The solid curve (magenta) represents
the distribution of ISI generated by the simulation model of Section 3.1. The dashed
curve (blue) is the distribution of ISI for the average case from the convolution model of
Section 3.3. The plot on the right side is a zoomed-in view of Sub-carrier 74.
“The average case” is computed based on the phase of the echo being uniformly dis-
tributed between 0 and 2π. It represents the average distribution of ISI. From the zoomed-
in plot in Figure 3.43, it can be seen that the distribution of ISI generated by Section 3.1
is very close to the ISI generated with “the average case”.
76
3.3.3 Effect of Parameter Values
In Section 3.1.5, the effects of changing the length of cyclic prefix, the echo’s delay and the
echo’s magnitude on the distribution of ISI generated by the simulation model in Section 3.1
were explored. Changing these parameters should have the same effect on the distribution of
ISI generated by the convolution model. To test the performance of the convolution model,
the effects of these factors on ISI are determined by changing one parameter at a time.
To make the distribution of ISI generated by the convolution model closer to the one
generated by the simulation model in Section 3.1, “the average case” is used for verification
in this section.
3.3.3.1 Effect of the Length of Cyclic Prefix
The effect of the length of the cyclic prefix on the ISI is determined using the model
of this section by changing NCP from 256 to 96 samples. The other parameters remain
unchanged, i.e. the echo’s delay, D, equals 500 and the echo’s magnitude, Ae, equals −16dB.
The spectral distributions of the ISI generated by the simulation model of Section 3.1 and
3.3 are plotted in Figure 3.44. The solid curve (magenta) represents the distribution of
ISI computed from the simulation model in Section 3.1. The dashed curve (blue) is the
distribution of ISI generated by the convolution model of this section. The plot on the right
side is a zoomed-in view of Sub-carrier 74.
It can be seen from the zoomed-in plot in Figure 3.44, that the curve generated from the
simulation of this section agrees very well with the curve generated in Section 3.1 when the
length of the cyclic prefix has length 96. Therefore, it can be concluded that the convolution
model works well for the cyclic prefixes of different lengths.
3.3.3.2 Effect of the Echo’s Delay
The effect of the echo’s delay on the convolution model is tested in this subsection. The
echo’s delay, D, is changed from 500 to 1000 samples and the length of the cyclic prefix is
changed back to 256 as it was in Section 3.1. The echo’s magnitude, Ae, remains −16dB.
77
Figure 3.44 Distribution of ISI comparing the results of simulation model to con-
volution model for NCP=96, echo’s delay D=500, Echo’s magnitude
Ae = −16dB and a single non-zero sub-carrier, SC-74.
The spectral distributions of the ISI generated by the simulation model of Section 3.1 and
the convolution model in this section are plotted in Figure 3.45. The solid curve (magenta)
represents the distribution of ISI generated by the simulation model of Section 3.1. The
dashed curve (blue) is the distribution of ISI generated by the convolution model. The plot
on the right side is a zoomed-in view of Sub-carrier 74.
It can be seen from the zoomed-in plot in Figure 3.45, that with the change of the echo’s
delay, the distribution of ISI across the entire frequency spectrum from the convolution
model fits the distribution of ISI from the simulation of Section 3.1 very well. Therefore, it
can be concluded that the convolution model works well over a range of delays.
3.3.3.3 Effect of the Echo’s Magnitude
The accuracy of the convolution model is tested when the echo’s magnitude, Ae, is
changed from −16dB to −35dB and the echo’s delay is changed back to 500 samples. The
length of the cyclic prefix remains 256. The spectral distributions of the ISI generated by
78
Figure 3.45 Distribution of ISI comparing the results of simulation model to con-
volution model for NCP=256, echo’s delay D=1000, Echo’s magnitude
Ae = −16dB and a single non-zero sub-carrier, SC-74.
the simulation model of Section 3.1 and the convolution model in this section are plotted
in Figure 3.46. The solid curve (magenta) represents the distribution of ISI generated by
the simulation model in Section 3.1. The dashed curve (blue) is the distribution of ISI
generated by the convolution model. The plot on the right side is a zoomed-in view of the
plot on the left side.
It can be seen from the zoomed-in plot in Figure 3.46, that with the change of the echo’s
magnitude, the distribution of ISI across the entire frequency spectrum from the simulation
model in Section 3.1 is almost equal to the distribution of ISI from the convolution model.
Therefore, it can be concluded that the convolution model works well over a range of echo
strengths.
3.3.4 Conclusion
From observations made in Section 3.3.3.1, Section 3.3.3.2 and Section 3.3.3.3, where
comparisons between the simulation model in Section 3.1 and the convolution model in this
section are made, it can be concluded that the convolution model is accurate over a wide
79
Figure 3.46 Distribution of ISI comparing the results of simulation model to con-
volution model for NCP=256, echo’s delay D=500, Echo’s magnitude
Ae = −35dB and a single non-zero sub-carrier, SC-74.
range of parameter values.
Therefore, if given the length of cyclic prefix, the echo’s delay, the echo’s strength and the
present sub-carrier number, the convolution model can be used to estimate the distributions
of ISI and IaSI. This convolution method will be modified and applied to the final “CP
length selection” model.
3.4 Aggregate Interference Corrupting a Single Sub-carrier
The ISI and IaSI for each single sub-carrier are estimated using the convolution method
introduced in Section 3.3.1. Of interest in this section is the aggregate interference corrupting
a sub-carrier when all active sub-carriers (i.e. Sub-carrier 74 to 1973) are present.
Let ISISC(ki) denote the component of ISI on Sub-carrier i that was generated by Sub-
carrier k. Similarly, let IaSISC(ki) denote the component of IaSI on Sub-carrier i that was
generated by Sub-carrier k. Aggregate interference corrupting Sub-carrier i is given by:
ISIAggregate(i) =1973∑k=74
ISISC(ki) +1973∑k=74
IaSISC(ki), i = 74, 75, ...1973. (3.40)
80
This equation is used in the next section to find the optimum length for the cyclic prefix
for a given echo delay.
81
4. Chapter4: Best Cyclic Prefix Length Selection
The objective of this chapter is to generate a computer program that can be used to
determine the best cyclic prefix length for an arbitrary cable network, given that the delays
and strengths of the echoes in the network are known.
An overview of the program will be given in the first section and then the program will be
explained step by step in the rest of this chapter. Finally, some test results will be presented.
4.1 Best CP Length Selection Program Overview
To introduce the program better, some background knowledge about the cable modem
upstream transmission system has to be mentioned first. Perhaps the most important thing
to know is the OFDMA signal is sent in frames from the CMs to CMTS. The CMTS assigns
the constellation order to each CM on a frame by frame basis. The constellation order is
assigned to maximize throughput for the SNR. If the SNR for a CM is low, then that CM is
assigned a low modulation order.
The program that calculates the best CP length must also calculate the optimum con-
stellation order for the CMs that share a frame. Then, after calculating the inter CM
interference, it computes the “useful data per minislot”1 for each of the possible CP lengths.
The CP length which offers the best “useful data per minislot” will be chosen to be the best
CP length for the frame.
1The “useful data per minislot” is a criteria set in the program judging the transmission quality and
efficiency, which depends on the number of transmitted bits per frame, CP length, FFT size and some other
parameters. Its definition and mathematical expression is included in Section 4.5.
82
Table 4.1 The input parameters for the best cyclic prefix length selection program
Parameters Notation Possible Values
CMTS
FFT size NFFT 2048, 4096
Sampling frequency FS 102.4MHz
Number of symbols
per frameNumsym No typical value
Number of sub-channels
per minislotQ 8, 16
User Group
The number of CMs
in the systemLcm
No larger than
the number of
active minislots
The average delay
of each CMdelayus
The number of
occupied minislots.Random
Which CM is assigned to
each minislotRandom
The best CP length selection program is designed to apply to a real cable modem com-
munication system. By analyzing the system’s parameters, the program can suggest a best
cyclic prefix length for this system. The input parameters and the brief flowchart of the
program will be introduced in the following sub-sections.
4.1.1 Input Parameters to the Program
The input parameters to the best CP length selection program are listed in Table 4.1.
At the CMTS side, the FFT size of the transmitted OFDMA signal (NFFT ), the sampling
frequency, the number of symbols per frame and the number of sub-channels per minislot are
known by the cable operator. The numbers of minislot occupied by users, the distribution
of the users’ delay and some other users’ information can be collected from the users’ trans-
mission history. These known variables are input to the best CP length selection program.
83
The cyclic prefix length is also an input to the system. DOCSIS3.1 allows the cyclic
prefix to have one of the following eleven lengths: 96, 128, 160, 192, 224, 256, 288, 320, 384,
512 and 640. The strategy used in the program is to try one cyclic prefix length at a time
and compute the transmission system’s useful data per minislot for that length. The length
that offers the highest useful data per minislot will be selected as the best CP length for the
system.
4.1.2 Flowchart of the Program
The flow chart of the working process of the best CP length selection program is shown
in Figure 4.1. For a single frame, the best CP length selection program starts by picking
the first possible CP length, i.e. 96, for computation. With this CP length, the program
will firstly estimate the aggregate interference for each sub-carrier, and then estimate the
aggregate interference for each minislot. Each minislot contains Q sub-carriers and the
largest interference of the Q sub-carriers is chosen to be the interference of the minislot.
With the interference of each minislot known, the next step is to compute the MER for
each minislot. Then, an optimum constellation order for each minislot is chosen based on
the calculated MER and the target BER. Finally, the useful data per minislot is calculated
using a mathematical method.
The algorithm is repeated for each possible CP length. After computing the useful
data per minislot for all of the allowable CP lengths, the CP length that offers the best
performance is selected as the optimum CP length for this frame.
The Best CP Length Selection Program will be introduced and explained step by step in
the following sections.
The program uses some results from Chapter 3. In the last section of Chapter 3, a
convolution model was developed to estimate the distributions of ISI and IaSI for each
sub-carrier. Equation (3.40) computes the aggregate interference corrupting a sub-carrier
when all active sub-carriers are present. These two results will be applied to the aggregate
interference computation in Section 4.2.
84
Table 4.2 The micro-reflections bound for dominant signal echo
Echo’s delay Echo Strength
≤0.5 µs -20 dBc
≤1.0 µs -25 dBc
≤1.5 µs -30 dBc
>2.0 µs -35 dBc
>3.0 µs -40 dBc
>4.5 µs -45 dBc
>5.0 µs -50 dBc
4.2 Aggregate Interference Computation
After choosing a candidate CP length, the next step for the Best CP Length Selection
Program is to compute the aggregate interference for each minislot.
A minislot cannot be shared among CMs. It can be empty or occupied by data from one
CM. Therefore, the Q sub-carriers in one minislot experience the same echo and therefore
the same delay. The delay of the echo for each CM is known to the CMTS.
According to DOCSIS3.1, the strength of the echo, Ae, depends on the echo’s delay. The
relationship between the echo’s delay and its maximum possible strength is tabulated in
Table 4.2. The strength of the echo encounted by a sub-carrier is taken to be the maximum
possible for the echo’s delay according to Table 4.2.
With the known echo delay and echo strength for each sub-carrier, the aggregate in-
terference of each sub-carrier can be computed using the convolution model developed in
Chapter 3. With the known cyclic prefix length NCP , echo’s strength Ae and echo’s delay
D for each sub-carrier, the convolution model is able to compute the aggregate interference
of every sub-carrier.
The next step is to find the aggregate interference for each minislot. The aggregate
interference for a minislot is taken to be the largest aggregate interference of the Q sub-
carriers in the minislot. That is because, if the system can guarantee the transmission
86
quality of the worst sub-carrier, the quality of all the Q sub-carriers in this minislot can be
guaranteed.
The MATLAB script which performs the aggregate interference computation function is
included in Appendix E.
4.3 MER Computation
Once the aggregate interference is known, the MER of each minislot can be computed.
MER is an acronym for modulation error ratio. Because of noise, the transmission and
constellation mapping are not always accurate. MER is a measure of the “fuzziness” of the
received symbol points in a constellation [33]. A larger MER value means better performance.
The mathematical expression for MER is
MER = 10× log10(Average Signal Power
Average Error Power) (4.1)
where the average signal power refers to the received signal power, which is the reference
power mentioned in Section 3.3.2. The average error power is the aggregate interference for
every minislot.
As discussed in Chapter 3, the reference power can be computed in three ways (referred
to as the largest case, the smallest case, and the average case).
For the largest case, the reference signal has power:
Reference−Powerlargest = (1 + Ae)2;
Since MER increases with signal power, the scenario with the largest reference power is the
best case in terms of performance. The MER value for minislot b in the best case is denoted
MERbest(b), which is given by:
MERbest(b) = 10× log10((1 + Ae)
2
Aggregate Interference(b)); (4.2)
For the worst case, the signal power is as small as possible which has the reference signal
power:
Reference−Powersmallest = (1− Ae)2;
87
The lowest signal power contributes to the worst case for the transmission system. The MER
value for minislot b in the worst case is denoted MERworst(b), which is given by:
MERworst(b) = 10× log10((1− Ae)
2
Aggregate Interference(b)); (4.3)
The average reference signal power is given by:
Reference−Powerave = 1 + A2e.
In this case, the MER value for minislot b is denoted MERave(b), which is given by:
MERave(b) = 10× log10(1 + A2
e
Aggregate Interference(b)); (4.4)
All three cases are considered separately. To make the explanation clearer, only the average
case is included in the model description. However, all three cases are included in the results.
4.4 Constellation Type Selection
The next step is to choose a suitable constellation type for each minislot.
The CMTS is able to assign any constellation order listed in Table 4.3 to any CM. To
ensure the signal transmission quality, the constellation order must meet the requirement
of Bit Error Rate (BER) and therefore MER. The possible upstream constellation types in
DOCSIS 3.1 are listed in Table 4.3. The table lists the constellation orders, M , which are
perhaps obvious and also the number of data bits per symbol, k.
For those minislots that don’t have interference, the highest constellation order will be
chosen to guarantee the fastest transmission speed. For the minislots that suffer from inter-
ference, MERs have been computed in the last section.
BER must be taken into consideration in choosing a constellation type for the minislot
with interference. BER is an acronym for Bit Error Rate, which is the ratio of bits received
in error to the total number of bits received or processed over a defined amount of time [34].
To derive the relationship between BER, MER and constellation order, another variable,
SER which is an acronym for Symbol Error Rate is introduced [35]. SER is the ratio of
88
Table 4.3 All possible constellation orders for the upstream transmission
Constellation Type M k
QPSK 4 2
8-QAM 8 3
16-QAM 16 4
32-QAM 32 5
64-QAM 64 6
128-QAM 128 7
256-QAM 256 8
512-QAM 512 9
1024-QAM 1024 10
2048-QAM 2048 11
4096-QAM 4096 12
symbols received in error to the total number of symbols received over a given amount of
time.
The book “Digital Communications” [36] provides the relationship between BER and
SER as:
BER =1
k(1− 1√
M)× SER; (4.5)
where k is the number of bits per symbol and M = 2k is the modulation order, which is
synonymous to the constellation type.
There is no specific mathematical equation to describe the relationship between SER and
MER, but the upper bound of SER can be expressed mathematically as:
SER ≤ 4Q(
√3kEb
(M − 1)N0
); (4.6)
where EbN0
is the average SNR per bit (i.e. ratio of the average energy per bit to the power in
the noise over a 1 Hz bandwidth). In this case Q represents the “Q-function”, which is the
tail probability of the standard normal distribution [37]. Formally, the Q-function is defined
89
Figure 4.2 MER in dB vs. BER plot for all possible constellation orders
as:
Q(x) =1√2π
∫ ∞x
exp(−u2
2)du
MER actually can be considered as the average SNR per symbol. Therefore, EbN0
in dB
can be expressed by MER in dB with:
EbN0
= MER− 10log10(k) in dB; (4.7)
Combining Equations 4.5, 4.6 and 4.7, the upper bound of BER can be expressed as:
BERUpperBound =1
k(1− 1√
M)× 4Q(
√3k × 10(MER−10log10(k))/10
M − 1). (4.8)
where MER is in the unit of dB.
With Equation 4.8, the relationship between MER and BER for all possible constellation
types are shown in Figure 4.2.
The plotted curves are the upper bounds of BER. Therefore, at the computed MER
value, the selected constellation orders must make sure the relative BER is lower than the
90
Figure 4.3 An example to show how to choose a suitable constellation type
bound. To guarantee the transmission speed, the highest satisfactory constellation order is
chosen. For example, consider a scenario in which the required BER value is no larger than
10−7, which is the horizontal dashed line in Figure 4.3 and the computed MER value is 45
dB, shown as the vertical dashed line. In this scenario, to ensure the BER requirement is
met, all the constellation types in the shadowed part can be chosen for this minislot (all
except 4096-QAM). Among the available constellation orders, the largest one, 2048-QAM is
able to offer the highest data rate. Therefore, 2048-QAM is selected for each minislot.
The Matlab scripts that compute the constellation order selection is included in Ap-
pendix F.
4.4.1 The Usability of BER and MER Plot
The BER vs. MER curves plotted in Figure 4.3 were generated under the assumption
that the noise is additive, white and Gaussian distributed (i.e. AWGN) [38]. However,
the distribution of the aggregate interference has to be considered and may or may not
be Gaussian. Therefore, for the BER vs. MER curves plotted in Figure 4.3 to apply, the
91
Figure 4.4 The histograms of errors in active sub channel for QPSK with
NCP=256, D=500, Ae=-16dB
distribution of the interference must be shown to be Gaussian or at least nearly Gaussian.
With the help of the interference distribution model introduced in Section 3.1.3 on page
42, the differences between the transmitted and received signals in the active sub carriers
can be computed. The histograms of the real parts and the imaginary parts of errors are
shown in Figure 4.4 with a sample size of 1,900,000. These histogram plots show the shape
of the distribution of the error.
To check whether the distribution of the interference follow the Gaussian distribution or
not, the ideal Gaussian distribution is plotted together with the histograms. The probability
density function of Gaussian noise is given by:
PDF =1
σ√
2πe−
(x−µ)2
2σ2 (4.9)
where µ is the mean and σ is the standard deviation. In Figure 4.4, the bold curves in red,
which follow the shapes of the histograms, are the ideal Gaussian distribution shapes. From
Figure 4.4, it can be seen that both real and imaginary histograms have a nearly Gaussian
shape, which means the error due to interference is nearly Gaussian distributed.
92
From experimental observation, it has been shown that the constellation type, echo’s
delay, echo’s magnitude and cyclic prefix length do not affect the shape of the Gaussian
distribution. Therefore, the BER vs. MER curves plotted in Figure 4.2 can be used for
choosing the best constellation type.
4.5 Best CP Length Selection
With the best constellation type for every minislot chosen, the final step is to select a
best cyclic prefix length for the system. The cyclic prefix length must be the same for all
the minislots in a frame.
The selection criteria is to compute the useful data per minislot for the whole frame. The
equation is given by:
R =N∑i=1
k ×NS ×Q×NFFT
NFFT +NCP
× 1
N; (4.10)
where N is the number of minislots per frame, k is the number of transmitted bits per
symbol, NS is the number of symbols per frame, and in this case Q is the number of sub-
carriers per minislot. Therefore, k × NS represents the number of bits per sub-carrier per
frame.
Since there are Q sub-carriers per minislot, k×NS×Q represents the number of bits per
minislot.
Since N is the number of minislots per frame, summing over all minislots, i.e.∑N
i=1 k ×
NS ×Q, yields the number of bits per frame.
NFFT is the number of points used in the FFT, which is also the number of samples in a
symbol, and NCP refers to the cyclic prefix length (i.e. the number of samples in the cyclic
prefix). Therefore, NFFTNFFT+NCP
is the ratio of useful symbol length to total symbol length.
Multiplying this ratio by the number of bits per frame,∑N
i=1 k×NS×Q× NFFTNFFT+NCP
provides
the ratio of useful number of bits per frame, which is referred to as “useful data”.
Dividing the transmitted useful data by the number of minislots N gives the useful data
per minislot, which is the selection criteria for the best CP length and is denoted as R.
93
Table 4.4 Parameters used for testing
Parameters Value
NFFT 2048
CP 96,128,160,192,224,256,288,320,384,512,640
FS 102.4MHz
Numsym 16
BER ≤ 10−8
4.6 Program Testing
4.6.1 Parameters Used for Testing
For the purposes of testing, the users are divided into four groups. Each with 237 users.
Each user is assigned only one minislot. The four user groups are distinguished by the
distribution of their echo’s delay. The description of the user groups and the relevant results
are included in the following four sections.
The parameters used in the simulation are listed in Table 4.4. The NFFT used for testing
is 2048, which means the value for Q, which is the number of sub-carriers per minislot, must
be 8. Had 4096 been used for NFFT , then Q would have to be 16. FS is the sampling rate,
which is 102.4MHz. Numsym is the number of symbols per frame, which must be between 6
and 36. It is chosen to be 16. The BER must be less than 10−8.
In Section 4.3, three different cases of MER are discussed. The best case MER is com-
puted with the largest interference power. The worst case MER has the smallest reference
power and the average MER with average reference power. Although only the average case
is analyzed in the previous sections, all the three cases are actually been considered and
computed in the program. The computation for the three cases use the same algorithm but
different MERs. Therefore, the program will output the computed results and plots of the
three cases, which will indicate in the testings.
94
Figure 4.5 Distribution of echo’s delay in user group 1
4.6.2 Uniformly Distributed Echo’s Delays
The 237 users in the first user group has uniformly distributed echo delays. A histogram
of delays for the echo is plotted in Figure 4.5. The histogram shows the echo’s delays are
uniformly distributed from 0µs to 6.25µs.
After the processing of the best CP length selection system, the useful data per minislot
for every possible CP length is computed and given in Figure 4.6. As discussed in Section 4.3,
the best CP length selection system computed three cases: the best case, the average case
and the worst case. Figure 4.6 has three curves: where the solid blue line tagged with circles
represents the best case, the dash-dot red line tagged with stars represents the average case
and the untagged dashed green line represents the worst case. As Figure 4.6 shows, the three
curves are almost the same for all CPs.
For all the three cases, the curves increase slightly from CP=96 to CP=128 and then
keep dropping. That is because the overhead increases with increasing CP length.
95
Figure 4.6 The useful data per minislot for user group 1
For the three cases, when CP = 128, the useful data per minislot has the largest value.
Therefore, the best CP length for this group is 128.
Since some users experience more interference than others, they need to be assigned
different modulation orders in order to maximize the useful data per frame. For CP=128,
Table 4.5 shows the utilization of constellation type. It indicates that highest order modu-
lation that 7 users can support is 1024-QAM. 31 can support at most 2048-QAM and 199
users can support 4096-QAM.
4.6.3 Gaussian Distributed Echo’s Delays
The second group of users is characterized by the echo’s delays for the users having a
truncated Gaussian distribution. Figure 4.7 shows the distribution of echo’s delays among
the users in the group. The delay for each user was drawn from a Gaussian distribution with
a mean of 3.125µs and a standard deviation of 1, truncated at 0 and 6.25µs.
After the processing of the best CP length selection system, the useful data per minislot
96
Table 4.5 Number of users for each constellation type for user group 1
Constellation Type Number of users
QPSK 0
8-QAM 0
16-QAM 0
32-QAM 0
64-QAM 0
128-QAM 0
256-QAM 0
512-QAM 0
1024-QAM 7
2048-QAM 31
4096-QAM 199
Figure 4.7 Distribution of echo’s delay in user group 2
97
Figure 4.8 The useful data per minislot for user group 2
for every possible CP length was computed and plotted in Figure 4.8. Figure 4.8 also has
three curves: where the solid blue line tagged with circles represents the best case, the dash-
dot red line tagged with stars represents the average case and the untagged dashed green
line represents the worst case. The three curves are almost the same for all except two values
of CP: CP=96 and 128. However, even in the two exceptions, there is very little difference.
For all the three cases, the curves increase slightly from CP=96 to CP=128 and then
drop slightly from CP=128 to CP=224. For CP > 224, the curves drop quickly at a constant
rate. For the three cases, the useful data per minislot has the largest value for CP=128.
Therefore, choose CP=128 for this group.
Table 4.6 shows the utilization of modulation orders for CP=128. Note that in this
scenario fewer users can support 4096-QAM.
98
Table 4.6 Number of users for each constellation type for user group 2
Constellation Type Number of users
QPSK 0
8-QAM 0
16-QAM 0
32-QAM 0
64-QAM 0
128-QAM 0
256-QAM 0
512-QAM 0
1024-QAM 17
2048-QAM 59
4096-QAM 161
4.6.4 Compact Distribution of Echo’s Delays with “Outliers”
The third user group has echo’s delays concentrated in a relatively short time range with
a few “outliers”. As Figure 4.9. shows, the distribution of most of the users echo’s delays
uniformly distributed between 0µs and 3µs and 20 “outliers” users with an echo’s delay
6.25µs.
After the processing of the best CP length selection system, the useful data per minislot
for every possible CP length was computed and plotted in Figure 4.10. Figure 4.10 also
has three curves: where the solid blue line tagged with circles represents the best case, the
dash-dot red line tagged with stars represents the average case and the untagged dashed
green line represents the worst case. As Figure 4.10 shows, the three curves are very nearly
the same except at CPs with values CP=96 and 128, where they are still quite similar.
For all the three cases, the curves increase sharply from CP=96 to CP=128 and then
drop slightly from CP=128 to CP=224. For CP > 224, the curves drop relatively quickly.
For the three cases, when CP = 128, the useful data per minislot has the largest value.
Therefore, choose CP=128 for this group.
99
Figure 4.9 Distribution of echo’s delay in user group 3
Figure 4.10 The useful data per minislot for user group 3
100
Table 4.7 Number of users for each constellation type for user group 3
Constellation Type Number of users
QPSK 0
8-QAM 0
16-QAM 0
32-QAM 0
64-QAM 0
128-QAM 0
256-QAM 0
512-QAM 0
1024-QAM 13
2048-QAM 59
4096-QAM 165
Table 4.7 shows the utilization of modulation order. Comparison with Table 4.6 shows
that groups 2 and 3 have very similar utilization of modulation order.
4.6.5 Compact Distribution of Echo’s Delays with Large Mean
The last user group has the echo’s delays uniformly distributed between 3.25µs to 6.25µs
with one outlier having delay of 0.25µs (Shown in Figure 4.11).
After the processing of the best CP length selection system, the useful data per minislot
for every possible CP length is computed and plotted in Figure 4.12. Figure 4.12 also has
three curves: where the solid blue line tagged with circles represents the best case, the dash-
dot red line tagged with stars represents the average case and the untagged dashed green
line represents the worst case. As Figure 4.12 shows, the three curves are almost the same.
For all the three cases, the curves drop as CP increases. When CP = 96, the useful data
per minislot has the largest value. Therefore, choose CP=96 for this group. In this case, the
longest delay is 6.25us which is 640 in samples. If the CP length is chosen to be 640, which
can cover the longest delay length, the computed useful data per minislot is about 1170 bits.
101
Figure 4.11 Distribution of echo’s delay in user group 4
Figure 4.12 The useful data per minislot for user group 4
102
Table 4.8 Number of users for each constellation type for user group 4
Constellation Type Number of users
QPSK 0
8-QAM 0
16-QAM 0
32-QAM 0
64-QAM 0
128-QAM 0
256-QAM 0
512-QAM 0
1024-QAM 0
2048-QAM 0
4096-QAM 237
Compare to the best CP chosen by the program, the performance is not so good.
Table 4.8 shows the utilization of modulation order for this group. All users can be
4096-QAM. The reason for this is the echo strength are weaker for the larger delays shown
in Figure 4.11. One would think the CP should be longer for longer delays, but the strength
of the echos are so weak, they do not need to be protected by the cyclic prefix.
103
5. Chapter5: Discussion and Conclusion
5.1 Results Discussion and Further Test
Four hypothetical cable systems were tested with the Best CP Selection Program in
Section 4.6. The program suggested a best CP for each system based on the computed useful
data per minislot. According to the analysis of each user group, the results are reasonable.
However, the program is not perfect. The only two sources of noise considered in the
system are the Intra Symbol Interference and the Inter Symbol Interference. The channel
noise, the coding error and many other performance degrading effect factors are not included.
Comparing with the noise existing in a real system, the noise considered in this program is
much less. Dealing with less noise, a shorter CP length is enough to protect the transmission
quality. The analysis of the four users groups in Section 4.6 show, the optimum CP lengths
are no larger than 128. More tests should be conducted to verify the program works properly
for the user groups with more noise.
Instead of adding more noise to the transmission system, the program could be tested by
increasing the program’s accuracy. To achieve this, the BER requirement should be moved
from 10−8 to 10−20.
A test was performed leaving the other parameters of the program unchanged and testing
the first user group again with the BER requirement of 10−20. Result of this test is shown
in Figure 5.1.
As discussed in Section 4.3, the best CP length selection program considered three cases:
the best case, the average case and the worst case. Figure 5.1 also has three curves: where
104
Figure 5.1 The useful data ratio per minislot for each CP length with BER re-
quirement to be 10−20
the solid blue line tagged with circles represents the best case, the dash-dot red line tagged
with stars represents the average case and the untagged dashed green line represents the
worst case. As Figure 5.1 shows, the three curves are almost the same for all CPs.
For all the three cases, the curves increase slightly from CP=96 to CP=224 and then
drop slightly from CP=224 to CP=320. Finally, the curves keep dropping quickly. For the
three cases, when CP = 224, the useful data per minislot has the largest value. Therefore,
choose CP=224 for this group.
Table 5.1 shows the utilization of constellation type. It indicates that 10 users can support
1024-QAM. 47 can support 2048-QAM and 180 users can support 4096-QAM.
Comparison of this with the test done for BER < 10−8 shows there is no significant dif-
ference, but the number of users who can support the highest modulation order is decreased.
That is because with a more strict BER requirement, less interference can be tolerated and a
longer CP length is needed as well as lower constellation orders are necessary for protection
105
Table 5.1 Number of minislots for each constellation type with echo delays uni-
formly distributed for BER no larger than 10−20
Constellation Type Number of minislots
QPSK 0
8-QAM 0
16-QAM 0
32-QAM 0
64-QAM 0
128-QAM 0
256-QAM 0
512-QAM 0
1024-QAM 10
2048-QAM 47
4096-QAM 180
against interference.
Therefore, with stricter requirements or with more noise, the best CP length may change.
This thesis provides a framework for calculating the best CP length for any cable system.
From the testing performed in this study, the system appears to be to be reliable.
5.2 Future Work
In this thesis, a program to find the best CP length for an upstream transmission system
was developed. The program can help to maximize throughput in DOCSIS 3.1 systems by
balancing the transmission efficiency and quality.
However, the program developed in this thesis is meant to be a ‘proof of concept’. Some
factors have been ignored to simplify the analysis and to make the main idea more clear and
logical. For example, the bit error rate considered in this thesis does not consider the effect
of LDPC encoding. Therefore, for future study, all the missed details can be added to make
the model more precise.
106
• The roll-off period (RP) is a repetition of part of the OFDMA symbol and is attached
to the end of each symbol. It should be included in the signal construction. Together
with CP, RP will affect the cyclic prefix length selection by modifying the ISI and IaSI.
• Some components of noise were ignored by the system developed in this thesis. Com-
ponents, such as the channel noise could be added in future studies.
• Not all the processes that affect the system performance were considered in this study.
The missing processes should be added to the system. According to the rules of DOC-
SIS3.1, there is an error correction process that uses Low-Density Parity-Check, LDPC
for short. LDPC is applied to the received signal to correct bit errors. Therefore, MER
should be computed after error correction. Inclusion of LDPC may affect the choice
for CP length.
The system can be improved not only by adding more details, but also by being mul-
tifunctional. For example, it could be modified to place more weight on VIP customers’
transmission quality and speed. If some users want to pay more to guarantee his/her cable
modem transmission quality and speed, when the system starts to choose a suitable CP
length for this user group, the system should make sure the paid customers can experience
4096-QAM constellation type and a high quality transmission.
Although a lot of work needs to be done to make the system perfect, the current work
provides a good base which can be expanded in future studies.
107
A. DOCSIS 3.1 Table 5-2
Figure A.1 Table 5 2 - Typical Upstream RF Channel Transmission Characteristics
108
B. The Main MATLAB Script for the ISI
Distribution Simulation Model
% this is the main MatLab program to discover
%the ISI distribution
clear all;
close all;
%% System parameters
N_FFT = 2048; % FFT size in DOCSIS3 .1 upstream is
%2048 or 4096
N_CP = 256; % cyclic prefix length
%either 96,128,160,192,224,256,288,320,384,512,640
N_RP = 0; % number of roll-off samples, either
% 0,32,64,96,128,160,192,224
Mod_type = ’QPSK’;
Sub_chan = 74:74; % sub-channel mapping
Ae= -16; % the echo strength, in dB
D=500; % echo delay time
time=100; % run 100 times and compute the average
W=length(Sub_chan);
for n=1:time
%% transmitter
% OFDM signal 1 and 2
[tx_1]=OFDM_Tx(N_FFT,N_CP,N_RP,Sub_chan,Mod_type);
109
[tx_2]=OFDM_Tx(N_FFT,N_CP,N_RP,Sub_chan,Mod_type);
tx=[tx_1;tx_2];% composite signal
%% channel
[rx,h_equ]=Channel(tx,D,Ae);
%% compute the ISI
Main_path_sym2=tx(2*N_CP+N_FFT+1:2*(N_CP+N_FFT));
%The main path of Symbol 2
error=rx(2*N_CP+N_FFT+1:D+N_CP+N_FFT)...
-Main_path_sym2(1:D-N_CP);
%The ISI segment in Symbol 2
e=[error;zeros(N_FFT-length(error),1)];
%To the purpose of FFT, extend ISI segment with 0s
E(n,1:N_FFT)=1/sqrt(N_FFT)*...
abs(fft(e.*exp(1j*pi*[0:N_FFT-1]).’));
ISI(n,1:N_FFT) = E(n,1:N_FFT).^2;
%% Reference power
[rx_noISI,h_equ]=Channel(tx,200,Ae);
rx_sig=rx_noISI(2*N_CP+N_FFT+1:2*(N_CP+N_FFT));
%The received Symbol 2 without ISI
reference_power = sum(abs(rx_sig).^2);
%% ISI in dB
ISIdB= ISI/reference_power;
end
Time_ISI=sum(ISIdB)/time;
110
figure(1);
plot(1:N_FFT,10*log10(Time_ISI));
hold on;
S=[’ISI distribution with N_C_P=...
’,num2str(N_CP),’, Delay D=’,num2str(D),...
’, Echo strength A_e=-16dB, Sub-carrier’,...
num2str(Sub_chan(1))];
title(S,’fontsize’, 14 );
xlabel(’Sub-Carrier Number’,’fontsize’, 16 );
ylabel(’ISI in dB’,’fontsize’, 16 );
plot([74 74], get(gca, ’YLim’),’--r’,...
’linewidth’,2);
axis([0 N_FFT -120 -20]);
set(gca, ’fontsize’, 16 );
set(gca,’linewidth’,2)
grid on;
111
C. The Main MATLAB Script for the ISITOTAL
Distribution Corroboration Model
% this is the main MatLab program to collaborate
% the distribution of ISI_TOTAL
clear all;
close all;
%% System parameters
N_FFT = 2048; % FFT size in DOCSIS3 .1 upstream is
% 2048 or 4096
N_CP = 256; % cyclic prefix length
%either 96,128,160,192,224,256,288,320,384,512,640
N_RP = 0; % number of roll-off samples, either
% 0,32,64,96,128,160,192,224
Mod_type = ’QPSK’;
Sub_chan = 74:74; % sub-channel mapping
Ae= -16; % echo strength, in dB
D=500; % echo delay time
time = 100; % run 100 times and compute the average
W = length(Sub_chan); % used channel width
for n=1:time
%% transmitter
% OFDM symbol 1 and 2
[tx_1]=OFDM_Tx(N_FFT,N_CP,N_RP,Sub_chan,Mod_type);
112
[tx_2]=OFDM_Tx(N_FFT,N_CP,N_RP,Sub_chan,Mod_type);
tx=[tx_1; tx_2];% composite signal
%% channel
[rx,h_equ]=Channel(tx,D,Ae);
%% receiver
[rx_info]=OFDM_Rx(rx,N_FFT,N_CP,Sub_chan,Mod_type,h_equ);
%The constellation constructed from the received Symbol 2
%% reference power
[rx_ref,h_ref]=Channel(tx,200,Ae);
[rx_info_ref]=OFDM_Rx(rx_ref,N_FFT,N_CP,...
Sub_chan,Mod_type,h_ref);
% The constellation constructed from the
% received no-ISI Symbol 2
reference_power = sum(abs(rx_info_ref).^2);
%% ISI_TOTAL indB
ISI_TOTALdB(n,1:N_FFT)=abs(rx_info - rx_info_ref).^2...
/reference_power;
end
freq_ISI=sum(ISI_TOTALdB)/time;
figure(1);
plot(1:N_FFT,10*log10(freq_ISI));
hold on;
S=[’ISI_T_O_T_A_L distribution with N_C_P=’...
,num2str(N_CP),’, Delay D=’,...
num2str(D), ’, Echo strength A_e=-16dB,...
113
Sub-carrier’,num2str(Sub_chan(1))];
title(S,’fontsize’, 14 );
xlabel(’Sub-Carrier Number’,’fontsize’, 16 );
ylabel(’ISI in dB’,’fontsize’, 16 );
plot([74 74], get(gca, ’YLim’),’--r’,’linewidth’,2);
axis([0 N_FFT -120 -20]);
set(gca, ’fontsize’, 16 );
set(gca,’linewidth’,2)
grid on;
114
D. The MATLAB Script for the ISI Distribution
Convolution Model
% this is the MatLab program of the convolution model
%to discover the ISI distribution
clear all;
close all;
%% System parameters
N_FFT=2048;
N_CP=256; %cyclic prefix length
D=500; %the echo’s delay
Ae=-16;%the echo’s magnitude in dB
Sub_chan=74; %the only non-zero sub-carrier
time=100;
%% Build the extracting mask in frequency domain
L=D-N_CP; %length of ones
mask=[zeros(1,N_FFT-L),ones(1,L)];%mask in time domain
MASK=1/sqrt(N_FFT)*...
abs(fft(mask.*exp(1j*pi*[0:N_FFT-1])));
%mask in frequency domain
Mshift=circshift(MASK,[0 -N_FFT/2]);
%shift for circular convolution
%% Build the ISI segment in frequency domain
115
echo(1:N_FFT)=zeros(1,N_FFT);
echo(Sub_chan)=10^(Ae/20)*exp(1j*rand(1)*2*pi);
% The transmitted signal has magnitude of
% Ae dB and a random phase
%% Do circular convolution
ISI_seg(1:N_FFT)=1/sqrt(N_FFT)*...
cconv(Mshift,echo(1:N_FFT),N_FFT);
% Compute the ISI power
ISI(1:N_FFT)=ISI_seg(1:N_FFT).^2;
%% Compute the reference power
% study the received power in
% the best, average and worst cases
Pref_best=(1+10^(Ae/20))^2;
Pref_ave=1+(10^(Ae/20))^2;
Pref_worst=(1-10^(Ae/20))^2;
%% Compute ISI in dB
ISIdB_best(1:N_FFT) = ISI(1:N_FFT)/Pref_best;
ISIdB_ave(1:N_FFT) = ISI(1:N_FFT)/Pref_ave;
ISIdB_worst(1:N_FFT) = ISI(1:N_FFT)/Pref_worst;
Est_ISI_best = abs(ISIdB_best);
Est_ISI = abs(ISIdB_ave);
Est_ISI_worst = abs(ISIdB_worst);
%% Plot
figure(1);
plot(10*log10(Est_ISI_best));
hold on;
S=[’The ISI Distribution with N_C_P=’,...
num2str(N_CP),’, Delay D=’,num2str(D),...
116
’, Echo strength A_e=’ num2str(Ae),...
’, Sub-carrier’,num2str(Sub_chan),...
’ for the Average Case’];
title(S,’fontsize’, 14 );
xlabel(’Sub-Carrier Number’,’fontsize’, 16);
ylabel(’ISI in dB’,’fontsize’, 16 );
plot([74 74], get(gca, ’YLim’),’--r’,...
’linewidth’,2);
axis([0 N_FFT -120 -20]);
set(gca, ’fontsize’, 16 );
set(gca,’linewidth’,2)
grid on;
figure(2);
plot(10*log10(Est_ISI));
hold on;
S=[’The ISI Distribution with N_C_P=’,...
num2str(N_CP),’, Delay D=’,num2str(D),’...
, Echo strength A_e=’ num2str(Ae),...
’, Sub-carrier’,num2str(Sub_chan),...
’ for the Best Case’];
title(S,’fontsize’, 14 );
xlabel(’Sub-Carrier Number’,’fontsize’, 16);
ylabel(’ISI in dB’,’fontsize’, 16 );
plot([74 74], get(gca, ’YLim’),’--r’,...
’linewidth’,2);
axis([0 N_FFT -120 -20]);
set(gca, ’fontsize’, 16 );
set(gca,’linewidth’,2)
grid on;
117
figure(3);
plot(10*log10(Est_ISI_worst));
hold on;
S=[’The ISI Distribution with N_C_P=’,...
num2str(N_CP),’, Delay D=’,num2str(D),...
’, Echo strength A_e=’ num2str(Ae),...
’, Sub-carrier’,num2str(Sub_chan),...
’ for the Worst Case’];
title(S,’fontsize’, 14 );
xlabel(’Sub-Carrier Number’,’fontsize’, 16 );
ylabel(’ISI in dB’,’fontsize’, 16 );
plot([74 74], get(gca, ’YLim’),’--r’,...
’linewidth’,2);
axis([0 N_FFT -120 -20]);
set(gca, ’fontsize’, 16 );
set(gca,’linewidth’,2)
grid on;
118
E. The MATLAB Script for the Aggregate
Interference Computation Function of the
Final Model
function [ISI_corrupt,Ae] = frame_effect(CP, N_FFT,...
delay_us, delay_sample, L_cm, Bound_up, Bound_low)
Q=Bound_low(1)-Bound_up(1)+1;
for a = 1:length(CP)
N_CP = CP(a); %cyclic prefix length
for b = 1:L_cm
D = delay_sample(b);
%echo delay for each cable modem
if N_CP < D
% set the echo magnitude in dB
if delay_us(b) <= 0.5
Ae(b,a) = -16;
elseif delay_us(b) <= 1
Ae(b,a) = -22;
elseif delay_us(b) <= 1.5
Ae(b,a) = -29;
elseif delay_us(b) > 4.5
Ae(b,a) = -51;
elseif delay_us(b) > 3
119
Ae(b,a) = -42;
else
Ae(b,a) = -35;
end
%Build the extracting mask in frequency domain
L=D-N_CP;
mask=[zeros(1,N_FFT-L),ones(1,L)];
MASK=1/sqrt(N_FFT)*...
abs(fft(mask.*exp(1j*pi*[0:N_FFT-1])));
Mshift=circshift(MASK,[0 -N_FFT/2]);
for c=Bound_up(b):Bound_low(b)
%Build the ISI segment in frequency domain
echo(1,1:N_FFT)=zeros(1,N_FFT);
echo(1,c)=10^(Ae(b,a)/20)*...
exp(1j*rand(1)*2*pi);
%The transmitted signal has magnitude of
%Ae dB and a random phase
%Do circular convolution
ISI_seg(1,1:N_FFT)=1/sqrt(N_FFT)*...
cconv(Mshift,echo(1,1:N_FFT),N_FFT);
%The distribution of ISI_TOTAL
% for each sub-carrier
ISI(c,1:N_FFT)=abs(2*(ISI_seg).^2);
figure(2);
plot(10*log10(ISI(c,1:N_FFT)));
axis([0 N_FFT -130 -30]);
title(’The plot of ISI spread ...
120
over all sub channels’);
xlabel(’Subchannel Number’);
ylabel(’ISI value’);
grid on;
end
else
ISI(Bound_up(b):Bound_low(b),1:N_FFT)=...
zeros(Q,N_FFT);
end
end
%Compute the ISI corrupted in each sub-carrier
ISI_corrupt(a,1:N_FFT)=sum(ISI);
end
121
F. The MATLAB Script for the Constellation
Order Function of the Final Model
function [k_element] = sel_k...
(ISI_corrupt, Bound_up, Bound_low, a, b, Ae)
%find the worst case MER for each cable modem
%find the largest ISI for each cable modem first
CM_ISI = max(ISI_corrupt(a,Bound_up(b):Bound_low(b)));
%Compute the reference power
%study the received power in the best,average
%and worst cases
Pref_best=(1+10^(Ae(b,a)/20))^2;
Pref_ave=1+(10^(Ae(b,a)/20))^2;
Pref_worst=(1-10^(Ae(b,a)/20))^2;
% Compute three cases MER for each CM
MER_best = 10*log10(Pref_best/CM_ISI);
MER_ave = 10*log10(Pref_ave/CM_ISI);
MER_worst = 10*log10(Pref_worst/CM_ISI);
MER=[MER_best MER_ave MER_worst];
for i=1:length(MER)
%select the best constellation order
122
k = 2:12;
M = 2.^k; %constellation type
Eb_N0 = MER(i)-10.*log10(k);
SER = 4*qfunc(sqrt((3*k.*10.^(Eb_N0/10))./(M-1)));
BER = 1./k.*(1-1./sqrt((M))).*SER;
% compute the BER with the given MER
f2 = find(BER<=10^-8);
% find the index of BERs no larger than 10^(-8)
if isempty(f2) == 1
k_element(i) = 0;
else
k_element(i) = f2(length(f2))+1;
%k is 1 larger than the index in the array
end
end
123
References
[1] California-Cable and Telecommunications-Association, “History of cable,” 2015. Com-
pany Website Homepage (http://www.calcable.org/learn/history-of-cable/).
[2] L. Harte, Introduction to Cable Television (CATV): Analog and Digital Television and
Modems. Althos, 2nd ed., 2007.
[3] CableLabs, Data-Over-Cable Service Interface Specifications DOCSIS 3.1. Cable Tele-
vision Laboratories, Inc., 2014.
[4] M. Kalman and B. Girod, “Modeling the delays of successively-transmitted internet
packets,” in Multimedia and Expo, 2004. ICME’04. 2004 IEEE International Conference
on, vol. 3, pp. 2015–2018, IEEE, 2004.
[5] M. Sadiku and C. Aduba, “Cable modem technology,” Potentials, IEEE, vol. 19, pp. 26–
27, August 2002.
[6] C. Franklin, “How cable modems work,” Apr. 2016.
[7] B. Berscheid, “FPGA-Based DOCSIS Upstream Demodulation,” July 2011.
[8] S. P. Crosby and G. K. Noreen, “Internet-based interactive radio system for use with
broadcast radio stations,” Sept. 30 2003. US Patent 6,628,928.
[9] G. Blonder, “Future of cable industry,” Apr. 26 2015.
[10] C. Franklin, How Cable Modems Work. How Stuff Works, 2010.
[11] J. Horton, R. Lee, and D. Pullen, “Method for the suppression and expansion of packet
header information in cable modem and cable modem termination system devices,”
Sept. 7 2004. US Patent 6,788,707.
[12] CableLabs, DOCSIS 3.1 PHYSICAL & MAC Layer Quick Reference Pocket Guide.
Cable Television Laboratories, Inc., 2014.
124
[13] T. R. Halemane and S. K. Korotky, “Distortion characteristics of optical directional
coupler modulators,” IEEE Transactions on Microwave Theory and Techniques, vol. 38,
pp. 669–673, May 1990.
[14] “Concepts of orthogonal frequency division multiplexing (ofdm) and 802.11 wlan,”
2016. Available at: Keysight Technologies, Inc., http://rfmw.em.keysight.com/
wireless/helpfiles/89600b/webhelp/subsystems/wlan-ofdm/Content/ofdm_
basicprinciplesoverview.htm.
[15] R. Prasad, OFDM for Wireless Communications Systems. Artech House, 2004.
[16] M. Ergen, Mobile Broadband Including WiMAX and LTE. Springer US, 2009.
[17] W. Henkel, G. Taubock, P. Odling, P. Borjesson, and N. Petersson, “The cyclic prefix of
ofdm/dmt - an analysis,” in Broadband Communications, 2002. Access, Transmission,
Networking. 2002 International Zurich Seminar on, pp. 22–1–22–3, 2002.
[18] R. Laroia, J. Li, S. Rangan, and S. V. Uppala, “Signal construction, detection and
estimation for uplink timing synchronization and access control in a multi-access wireless
communication system,” July 26 2005. US Patent 6,922,388.
[19] J. Armstrong, “Analysis of new and existing methods of reducing intercarrier interfer-
ence due to carrier frequency offset in ofdm,” Communications, IEEE Transactions on,
vol. 47, no. 3, pp. 365–369, 1999.
[20] M. H. Valipour, M. M. Homayounpour, and M. A. Mehralian, “Automatic digital mod-
ulation recognition in presence of noise using svm and pso,” in Telecommunications
(IST), 2012 Sixth International Symposium on, pp. 378–382, Nov 2012.
[21] N. Vlajic, “Analog Transmission of Digital Data: ASK, FSK, PSK, QAM,” 2010.
[22] R. Boschen, “QAM (quadrature amplitude modulation),” 2015. Available at: http:
//searchnetworking.techtarget.com/definition/QAM.
125
[23] GaussianWaves, “Introduction to ofdm orthogonal frequency division multi-
plexing part 3,” 2015. Available at: http://www.gaussianwaves.com/2011/06/
introduction-to-ofdm-orthogonal-frequency-division-multiplexing-part-3/.
[24] Y. Li, “Simplified channel estimation for ofdm systems with multiple transmit anten-
nas,” IEEE Transactions on Wireless Communications, vol. 1, pp. 67–75, Jan 2002.
[25] M. Speth, S. A. Fechtel, G. Fock, and H. Meyr, “Optimum receiver design for wireless
broad-band systems using ofdm. i,” Communications, IEEE Transactions on, vol. 47,
no. 11, pp. 1668–1677, 1999.
[26] Z. Miao, M. Tsao, S. Chen, and M. Liu, “System and method for detecting symbol
boundary in multi-carrier transmission systems,” Aug. 21 2001. US Patent 6,279,022.
[27] T. Murphy, “Symbol boundary detector method and device for ofdm systems,” Apr. 10
2007. US Patent 7,203,245.
[28] D. Liu, S. Tang, T. Liu, and K. Yen, “Symbol boundary detection device and method
for use in ofdm system,” June 24 2008. US Patent 7,391,828.
[29] A. Gorokhov and J.-P. Linnartz, “Robust ofdm receivers for dispersive time-varying
channels: Equalization and channel acquisition,” Communications, IEEE Transactions
on, vol. 52, no. 4, pp. 572–583, 2004.
[30] T. Seki, Y. Sugita, and T. Ishikawa, “Ofdm synchronization demodulation circuit,”
Feb. 11 1997. US Patent 5,602,835.
[31] M. Batariere, K. Baum, and T. P. Krauss, “Cyclic prefix length analysis for 4g ofdm
systems,” in Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th,
vol. 1, pp. 543–547 Vol. 1, Sept 2004.
[32] B. Hunt, “A matrix theory proof of the discrete convolution theorem,” IEEE Transac-
tions on Audio and Electroacoustics, vol. 19, no. 4, pp. 285–288, 1971.
[33] R. Hranac, BER and MER Fundamentals. Cisco Systems, Inc., 2007.
126
[34] B. Maxson, “Validating and troubleshooting ofdm - considerations and approaches,”
Society of Cable Telecommunications Engineers, Oct 2013.
[35] Y. Huang, Q. Song, S. Wang, and A. Jamalipour, “Symbol error rate analysis for m-qam
modulated physical-layer network coding with phase errors,” in Personal Indoor and
Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium
on, pp. 2003–2008, IEEE, 2012.
[36] J. G. Proakis, Digital Communications(4th Edition). 2001. page: 276-279.
[37] GaussianWaves, “Q function and Error functions,” 2015. Available at: http://www.
gaussianwaves.com/2012/07/q-function-and-error-functions/.
[38] F. Muller, “Distribution shape of two-dimensional dct coefficients of natural images,”
Electronics Letters, vol. 29, no. 22, pp. 1935–1936, 1993.
127