Multiuser soft interference canceler via iterative decoding for DSL ...

3 downloads 0 Views 200KB Size Report
(DMT) is one way to overcome the difficult transmission en- vironment, enabling high-data-rate service such as very-high- speed digital subscriber lines (VDSL) ...
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 2, FEBRUARY 2002

363

Multiuser Soft Interference Canceler via Iterative Decoding for DSL Applications Kok-Wui Cheong, Member, IEEE, Won-Joon Choi, Member, IEEE, and John M. Cioffi, Fellow, IEEE

Abstract—This paper presents a method to mitigate interference on a transmission system by another system with an overlapping frequency band. The systems are uncoordinated so that they cannot be made to transmit in orthogonal coding space. The transmission environment is an interference channel rather than the multiaccess channel often considered in other multiuser detection problems, for instance at the base station of a code division multiple access wireless system. Using the fact that the inputs are all from discrete constellations, it is possible to perform a multiuser maximum-likelihood (ML) detector to decode the signals from the system of interest with low probability of error. However, the ML detector often requires impractical computation. A soft linear canceler is instead used to reduce the interference with a small loss of bandwidth in the system of interest. The method has much lower complexity than a full-blown ML detector, and the soft canceler performance is close to a ML detector. The method is demonstrated on a very-high-speed digital subscriber lines system with a home local area network interference. The system of interest is using a multicarrier modulation transmission scheme such as discrete multitone, while the interfering system transmits using quadrature amplitude modulation. Index Terms—Digital subscriber line, iterative decoding, interference channel, multiuser detection, soft interference canceler.

I. INTRODUCTION

T

HERE IS considerable interest in broadband data service and computer networking for internet access. Using existing telephone wire infrastructure to provide high bandwidth connectivity is an attractive option, since most establishments in the world are already linked by this twisted pair infrastructure. However, the twisted-pairs were originally meant for telephone service, and the transmission characteristics at high frequencies were not considered in their design. This makes broadband transmission very challenging, since it will have to use the high-frequency band for transmission to avoid interfering with existing analog voice service and to achieve enough bandwidth to support the high-data rates required [1]. Discrete multitone

Manuscript received April 4, 2001; revised June 7, 2001. This work was supported in part by the National Science Foundation (NSF) under Grant NCR9628185, and in part by Alcatel, France Telecom, IBM, Samsung AIT, National, Sony, Fujitsu, and Voyan. K.-W. Cheong was with the Department of Electrical Engineering, Stanford University, Stanford, CA 94305-9515 USA. He is now with Marvell Semiconductor, Inc., Sunnyvale, CA 94085 USA (e-mail: kwcheong@DSL. Stanford.EDU). W.-J. Choi was with the Department of Electrical Engineering, Stanford University, Stanford, CA 94305-9515 USA. He is now with Atheros Communications, Inc., Sunnyvale, CA 94085-3512 USA (e-mail: [email protected]). J. M. Cioffi is with the Department of Electrical Engineering, Stanford University, Stanford, CA 94305-9515 USA (e-mail: [email protected]). Publisher Item Identifier S 0733-8716(02)00990-3.

(DMT) is one way to overcome the difficult transmission environment, enabling high-data-rate service such as very-highspeed digital subscriber lines (VDSL) [2]. The desire for connection to the Internet also creates the desire to connect computers and peripherals in the home. In order to avoid laying wires for this purpose, some have proposed to use the existing telephone wiring in the home for networking [home local area network (LAN)]. Unfortunately, this interferes with broadband transmission systems elsewhere on the twisted-pair lines. Depending on the situation, one transmission system can disable the other if nothing is done to prevent or mitigate the mutual interference. It is desirable for both systems to co-exist in order to provide a better use of the internet infrastructure. This is possible through the use of multiuser detection [3]. In this paper, a multiuser detector is used to avoid severe performance loss in VDSL that would otherwise be caused by the home LAN. The detector works in an interference channel, where an interference channel is defined by a receiver that receives the sum of signals from two or more transmitters. However, this receiver is only interested in detecting the signal from one of the transmitters, and the signals from the other transmitters are interference to the receiver. The receiver may choose to detect the interfering signals if it aids in the detection of the desired transmitter signals. A multiuser detector can be used for this type of detection. Most of the work on multiuser detection is geared toward multiple access channel although there are some works on single-user detection in multiuser systems [4]. In a multiple access channel, a common receiver is used to detect signals arriving from two or more transmitters. Detectors that are designed to work in a multiaccess channel environment would perform poorly in an interference channel environment. In an interference channel environment, the achievable rate for a detector designed for interference channel is higher than a detector designed for multiple access channel [5]. If a minimum bit error rate (BER) is desired, a maximumlikelihood detector on the desired signal will be the optimal detector. However, a joint maximum-likelihood (ML) receiver requires very high complexity. Instead, a suboptimum receiver that performs close to the ML receiver is the objective of our work here. This suboptimal receiver is a multiuser detector that uses soft interference cancellation and iterative decoding. Although this paper illustrates the soft interference canceler with a VDSL transmitter and a home LAN interferer, the detector can be applied, with some modifications, to similar systems such as a Gaussian interference channel or more generally an undersampled channel where the input dimension is larger than the output dimension, and to MIMO channels [6], [7].

0733–8716/02$17.00 © 2002 IEEE

364

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 2, FEBRUARY 2002

Fig. 1. Crosstalk system model.

from the home LAN sources. The receiver would want to reliably detect from the received signal . In this situation, we only but we have no control over have control over the signal since it is from another system. However, it is known that is transmitting at a fixed data rate with a known transmission scheme. Although no coordination can be done between the two systems, the designer can modify the VDSL system to aid its detection at the receiver. The interference problem can be considered abstractly for two users using the following framework in the frequency domain: (1)

Fig. 2. Interference model for system.

This paper is organized as follows. Section II describes the system model, illustrating how each system can interfere with the other. Section III describes the optimal detector and introduces a metric that determines when detection with low probability of error is possible. Section IV introduces a suboptimal detector, which is a multiuser soft interference canceler via iterative decoding. Section V introduces the block soft canceler that is a compromise between the full ML detector and the suboptimal detector in the previous section. Simulation results will be presented to show that significant performance improvement can be obtained from these receivers. II. SYSTEM MODEL Fig. 1 shows the scenario for the problem of interest. Highspeed Internet access is provided to the user through VDSL using the unshielded twisted copper pair from the telephone central office (CO) to the user. Other applications such as LAN use the in-house telephone wiring to do computer networking in order to avoid laying additional wirings in the user’s premises. By doing so, the signals of these applications interfere with the VDSL signals entering the user’s premises. Even if VDSL signals are not sent to the user’s premises with home LANs, the home LAN signal can leak out of the house and couple into other lines with VDSL signals through crosstalk. This near-end cross talk signals interferes with the detection of the VDSL signals in other user’s premises. The model for this system is shown in Fig. 2. The VDSL from the central office passes through the VDSL signal channel and arrives at the VDSL receiver. This signal is superthat passes through the imposed by the home LAN signal crosstalk channel. Background noises, such as VDSL far-end crosstalk (FEXT) and additive white Gaussian noise (AWGN) from thermal or electrical sources, are also present. These noises are usually small compared with the near-end crosstalk (NEXT)

and will be vecSince VDSL uses block transmissions, tors whose elements are drawn from discrete constellations. The and will be the DMT block size, and the size of size of will be the number of home LAN signals that interfers with one DMT block. The sizes of the constellations need not be the same or . and will be channel mafor the elements in trices for the VDSL channel and home LAN crosstalk channel, respectively. Although we will describe the problem with one interferer, the problem can be easily generalized to any number for of users by adding components like interferers, or by considering all “other users” as part of a . Since the sampling time of the larger vector component two systems will not be a integer multiple of each other in genwill appear to vary over blocks due to the eral, the matrices phase shifts. These phase shifts have to be taken into account in implementing the system. But for analysis, the matrices are assumed to be fixed since one block is considered at a time, and the time index need not be propagated. In the practical case of unsynchronized clocks, multiple phase lock loops are needed so matrices can be used at each block in time. that the proper and is assumed for Perfect knowledge of the matrices the rest of this paper. For convenience in notation, the receiver input is

(2) The receiver attempts to minimize the error rate in the detection . In this case, is a “fat” matrix since it has fewer output of dimensions than input dimensions. It is also possible that the VDSL signals will crosstalk into the home LAN receivers since crosstalk coupling works reciprocally. However, this crosstalk from VDSL into home LAN can be avoided by not transmitting or limiting transmission upstream (from home to CO) in the bands that are used by home LAN. In this way, the NEXT from VDSL is significantly reduced. FEXT from VDSL will still interfere with the operation of home LAN, but it should be small since FEXT goes through attenuation of the line. The VDSL system considered in this paper uses DMT for modulation. The bandwidth used is 1.104–17.664 MHz with 256 complex tones. The home LAN transmitter uses quadrature amplitude modulation (QAM) and is digitally modulated to

CHEONG et al.: MULTIUSER SOFT INTERFERENCE CANCELER VIA ITERATIVE DECODING FOR DSL APPLICATIONS

Fig. 3.

Home LAN transmit system.

Fig. 4.

Home LAN crosstalk PSD .

4–10 MHz frequency band as shown in Fig. 3. Fig. 4 shows the combined effects of the channel and the transmit power spectral density (PSD), and the home LAN crosstalk power at the VDSL receiver. The crosstalk can be significant for some VDSL line lengths. As a comparison, FEXT noises for the different lengths of VDSL line are also plotted on the same figure. As the length of the VDSL loop length increases, the home LAN crosstalk ranges from insignificant to significant to devastating. A VDSL receiver operating in this environment should be able to handle all three cases gracefully. III. OPTIMAL DETECTOR AND MINIMUM DISTANCE Rather than treating the interference as noise, the receiver can significantly improve its performance by jointly deand . As in any detection problem, good detection tecting performance occurs when there is a sufficiently large minimum distance between the constellation points to ensure a low probability of error. In our case, the definition of minimum distance is the minimum distance between two outputs that will cause an , error in detecting . Since the channel model is is the definition of (3) is the correlation matrix of . Hence, even though where two output points might be very close together, if the underlying is the same, no error will result in the detection of . The distance between these two points is not involved in the minican be removed in (3). mization. If the noise is white, the is too small for detection to be reIt might happen that liable. This is an indication that the data rates are beyond the

365

interference capacity region. Another way to look at this is that the signals from the two systems are not orthogonal enough to detect the primary signal reliably. To increase , we have to reduce data rate in the primary signal and increase the orthogonality. is to take advantage of the inherent One way to increase orthogonality in the two systems. Since VDSL is using DMT (modulation in the frequency domain) and home LAN is using can be inQAM (modulation in the time domain), the creased by zeroing tones in the VDSL signal. By zeroing tones, which can be done easily in DMT by simply not transmitting in those tones, the receiver has a clearer “look” at the home LAN signals at these frequency locations. Generally, tones with the largest interference are zeroed so as to get as big an SNR as possible for removal of the interfering signal. Frequency division multiplexing (FDM) is an extreme form of tone zeroing since the two systems in an FDM system do not have overlapping bandwidth. However, with the use of multiuser detection, such extreme measure need not be taken. is to introduce coding [5]. This Another way to increase coding can be done on the interferer or on the primary signal, although the latter is easier since the designer has control of it. Examples of codes that we can apply are simple parity check codes like low-density parity checks (LDPC) or more complex codes like Turbo codes. Tone zeroing is preferred over coding since it is simpler to implement and decode. IV. SUBOPTIMAL DETECTOR If the optimal detector is to minimize the probability of detection error, it will make ML decision. Hence, the estimate of a received signal is (4) For the case with no interference, different components in the vector are independent of each other (in the presence of uncorrelated white noise). The problem becomes a set of parallel minimizations of each vector component. The complexity of this algorithm is low (linear in the number of vector components). However, with interference, the vector components are coupled with one another through the interference. As a result, we have to do a full search over the set of possible . If the number of components is , and each input (primary and interfering) signal is a 4-QAM, the complexity is on the order of . As we shall see, in our case, . The number of , which is impossible to computations required will be implement physically. The optimal detector is impractical due to its high complexity. Therefore, we introduce a suboptimal detector that has much lower complexity and has a performance that is close to the optimal detector. The detector uses soft information obtained from the probability distribution of each input over its constellation points. The soft information is used to perform interference cancellation and this soft information is updated in an iterative manner to arrive at a decision that is reliable.

366

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 2, FEBRUARY 2002

Unlike some multiuser problems [8]–[10], the signals or cannot be estimated using traditional linear signal processing. This is because the signals are severely corrupted in this interference channel, and there is no filter that can estimate the inputs reliably in this very low signal-to-interference noise ratio (SINR) condition. Furthermore, the channel has more inputs than outputs, which make linear techniques difficult since there is a whole null space where the best estimate can lie, and all these estimates will have the same performance as targeted by the linear techniques. Fortunately, in our problem, the inputs are discrete constellations. As long as the channel matrix is not singular over this set of discrete inputs in the sense that it does not map two inputs to the same output, it is possible to recover the original signal (for example by the ML detection mentioned in previous Section III). Note that the channel can still be singular in the continuous domain. Such discrete properties are used in receivers such as decision feedback equalizers (DFE) and interference cancelers (IC) [11]. Decision-directed cancelers (unlike echo cancelers) are prone to error propagation. Error propagation is small at low , but can be a serious problem at higher . In our channel model, the initial estimates for the channel inputs will be bad since the primary signals are corrupted by interference and the interferer signals are corrupted by the primary signals. In order to overcome error propagation and to take the uncertainty of the tentative decisions into account, soft information is used [12]. The soft information is obtained via the probability distribution over the constellation points for each symbol. In our case, the soft symbol is defined as the expected value of the symbol given the received signal. Hence, for the th symbol, its soft value is defined as (5) The interference cancellation is done with these soft symbols. For the th symbol, the soft interference cancellation produces a statistic for its probability distribution

(6) is the th column of . From , we would obtain the where . It is easier to compute the distribution of distribution of and relate it to the distribution of using Bayes’ rule. Assuming the soft information is accurate, the soft interference cancellation gives

A. Interference Noise Power Estimation If is correct, then will be Gaussian disand covariance . However, this tributed with mean is not the case since the cancellation is not always perfect. The noise power due to incorrect cancellation has to be taken into account. Since

(8) . To comthe residual interference is given by pute its power, we assume that the probability distributions for are correct and compute the variance of about its . For mean . Denote this quantity by , 4-QAM constellation, this expression simplifies to for . The where given by interference noise power has a covariance matrix (9) is a diagonal square matrix with the th diagonal elewhere ment equal to , except the th diagonal element, which is zero. It is implicitly assumed that the input signals are independent. The combined noise power covariance matrix is (10) This noise covariance matrix is used to compute the probability distribution of . Since each row of has many nonzero com, by central limit ponents from the crosstalk channel matrix theorem (CLT), the noise will approach Gaussian. Given the size of our problem, the number of nonzero components will be 59, which is sufficiently large for the CLT to hold. The noise covariis a better estimate of the overall noise power ance matrix since it takes the uncertainty of the soft decisions into than account. Notice that the interference noise estimation requires quite a few matrix operations. In order to simplify the computation, an independence assumption is made on the interference plus AWGN noise power. Hence, only the diagonal of the interference plus AWGN noise power matrix is used in the probability distribution computation. In this case, the approximated matrix is given by

(11) is a column vector of ’s but with the th component where set to 0; is the Shur product for matrix, which is an element by element product; and is the conjugate of the matrix . Then, the combined noise is estimated by

(7) where

is the set of constellation points for the th symbol.

(12) Our simulations will show that this assumption is reasonable and does not prevent the convergence of the soft canceler. In

CHEONG et al.: MULTIUSER SOFT INTERFERENCE CANCELER VIA ITERATIVE DECODING FOR DSL APPLICATIONS

367

fact, when the probability distributions are correct, the noise covariance matrix will be diagonal. is given by The likelihood function for (13) where is a normalizing function. If the independence assumption is made, we can simplify (13) to (14) is the th diagonal element of and is the where th component of . Once the likelihood is computed for all , we can update the soft value for by (15) Fig. 5. Typical convergence curve for multiuser detection (MD) algorithm via iterative soft interference canceler.

In order to ensure that the update is reliable, an exception procedure is used when the likelihoods are all too small. This indicates that the noise is much smaller than the distances of the received value from the constellation points and, thus, the soft information is not very reliable. In this case, the soft symbol is either not updated or set to zero. This procedure prevents errant updates and improves the convergence properties of the algorithm. B. Initialization Initialization is required in this algorithm. Two initial conditions can be used. The first is to use pseudoinverse initialization. Since the soft symbol is the average value of the constellation points, the value of the soft symbol cannot exceed the boundary box of its constellation, . Hence, we have a clipped pseudoinverse initialization. Denote this pseudoinverse and the pseudoinverse applied to by by , then if if if

(16)

is the th component of , and and where are the minimum and the maximum can take, respectively. is complex, the clipping is done individually for each real If and imaginary part. The second way is to use zero as an initial condition since it is simple and the inputs are zero-mean to begin with. Computing the pseudoinverse requires quite a few computations, which makes it unattractive.

converge. The second criterion requires that the algorithm converges fast enough for all conditions. We will show this next with simulation results. Five to six iterations should be enough for this purpose. D. Convergence Analysis A typical convergence curve is shown in Fig. 5. The simulation is done for the worst case scenario in which the received signal power is close to the interference power. Six tones are zeroed to aid the detection. The curve shows that the algorithm converges in about five to six iterations. To prove that this algorithm always converges is hard, just as the proof of convergence of decoding algorithm of turbo code is hard. However, we can show that the algorithm has equilibrium points. The equilibrium points are points that remain invariant under repeated applications of the algorithm. Theorem 1: The multiuser detection algorithm via iterative soft interference cancellation has equilibrium points. The proof can be found in [5]. Additional steps to show that the algorithm converges will require a proof that there do not exist limit cycles and that, given any starting point, the iterations will map the original point to a region in which the algorithm is a contraction in that region. There may be more than one equilibrium point for the algorithm. However, the correct one will have soft values that are close to the points in the constellation. This is one way to check that the output of the algorithm is reasonable. If that is not the case, a different starting point may be used to obtain a better estimate. The flow chart for the algorithm is shown in Fig. 6. E. Complexity of Algorithm

C. Stopping Criterion The iterations can terminate in two ways. One way is to stop when the changes in the soft symbols are smaller than a preset threshold. The size of the threshold determines the number of iterations. A small threshold will increase the number of iterations. Another possibility is to fix the number of iterations. Both criterion relies on the fact that algorithm will eventually

The optimal algorithm is too complex to be practical. The suboptimal algorithm has a complexity that is more reasonable for implementation. From the description of the algorithm, it per DMT symbol seems that the complexity is at least in an iteration since we need to do noise estimation and soft inis the size of the vector terference cancellation. Recall that and is the number of tones in DMT that are affected by

368

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 2, FEBRUARY 2002

NUMBER

OF

TABLE I COMPUTATION REQUIRED FOR ITERATIVE SOFT INTERFERENCE CANCELER

: Size of constellation. : Number of iterations. is diagonal. There are Note that

VDSL symbols and

home LAN symbols.

Fig. 6. Flow diagram for MD via iterative soft cancellation.

the home LAN. However, all these steps have changes that are incremental. This enables simplification in the algorithm to reduce its complexity. For one DMT symbol, the initial estimate either takes no for pseudoincomputation for the all zero case, or operations verse case. The soft cancellation requires in subsequent iterations since the soft caninitially, but cellation value can be updated when a new estimate is made operation. Similarly, for noise estiof one symbol with operations, but mation, initial computation requires per subsequent iteration. Computing the new probability operadistribution and updating the soft symbol requires per tions per iteration. Hence, the overall complexity is iteration if we fix the number of iterations to be done. Therefore, . Compared for one symbol, the number of operations is complexity for the optimal algorithm where with is the constellation size, the soft canceler has a complexity that is much lower. Table I shows the count of the number of operations (multiply/add) for the algorithm. The table is for one iteration and the total number of operations for iterations is shown at the end of the table. The number of operations for one for the zero initialization case. symbol is F. Performance The DMT system uses 256 tones over the bandwidth 1.104–17.664 MHz. It is assumed that 4-QAM is used on the tones that are affected by the home LAN signals. The home LAN transmits 4-QAM over the bandwidth 4–10 MHz and the DMT system is transmitting downstream on these tones. The

Fig. 7. BER of iterative soft interference canceler (clipped pseudoinverse and zero initial estimate).

simulation result for the cases where clipped pseudoinverse and zero are used as the initial estimate is shown in Fig. 7. The two plots show that the performance of the algorithm using the two initial estimates is close. Since the interference goes from weak to strong compared with the desired VDSL signal, the BER curve for the overlapped frequency band has a hump at the middle loop length where the interference and signal power are about the same and separation of the signals is the most difficult. The clipped pseudoinverse initial estimate is slightly better than the zero initial estimate. However, the pseudoinverse requires more computation. In this case, the performance improvement is too small to justify in practical implementation of the algorithm. The rates of convergence for the two initial estimates are also close. Fig. 8 shows the comparison of the two typical con-

CHEONG et al.: MULTIUSER SOFT INTERFERENCE CANCELER VIA ITERATIVE DECODING FOR DSL APPLICATIONS

369

The same algorithm is able to work in low and high interference environment without having to detect the signal powers. This is an advantage over other algorithms that are seen in code division multiple access (CDMA) multiuser detectors (MUDs)where users with stronger signals are detected earlier. The soft information takes the uncertainty into account and the iterations will remove the importance of ordering the signal strength since the cancellations are done over many iterations. These features enable the algorithm to achieve lower error rates than other algorithms. V. BLOCK SOFT IC

Fig. 8. Convergence curve for clipped pseudoinverse and zero initial estimates.

The iterative soft interference canceler is able to reduce the effect of error propagation. However, the error rate is still not low enough for our application. The soft canceler breaks all links from other symbols in the state diagram for the input–output relationship when considering the effect of a particular symbol. The optimal ML detector does not break any links in this state diagram, but its complexity is too high for implementation. Iterative block soft interference canceler is a compromise between the two extremes. In an iterative block soft interference canceler, the symbols are grouped into blocks of two or more symbols. The groups need not be of the same size. The algorithm iterates among these groups. Hence, the iterative soft interference canceler is a special case of iterative block soft interference canceler with a block size of one for all blocks. The probability updates are done on the joint distribution of the symbols in the group. Suppose that there are groups and the th group symbols consists of , has , form a nonoverlapping partition of where . The probability updates for the th group will be done for

Fig. 9. Error rates without interference noise approximation and noise estimation.

vergence curves (400-m VDSL line). The pseudoinverse might converge faster since it is a better initial estimate. However, as seen in the plots, five to six iterations will be good enough for the algorithm to converge in both cases. In order to show that the independence assumption in the noise estimates for the interference noise power is reasonable, simulations are done for the case in which the interference noise power is not approximated by the independence assumption on the interference. Fig. 9 shows the result. The simulation results shows that the approximation does not reduce the effectiveness of the algorithm. To show that the interference noise power needs to be considered, simulations are also done without estimating the interference noise power. Fig. 9 shows the error rates from this algorithm. The plot shows that interference noise estimation is important for the algorithm to perform well. If the interference noise is not estimated, the error rates are high when the interferer is strong.

(17) , and . Since the sum is done over the cross product of the constellations, the complexity is increased. Instead of doing computations for the likelihoods, the algorithm has to do computations for the likelihoods. For large groups, the increase will be big. However, if the group size is made small (for example two or three), the complexity increase is still manageable. Since the block iterative soft interference canceler is more complex, the performance should be better than the iterative soft interference canceler for it to be considered. Fig. 10 shows the BERs for the simulation with an even block size of two. The setting is the same as the plot of Fig. 7. The simulation shows that the algorithm with a block size of two performs better. Such error rates enable forward error correction (FEC) codes to drive the BERs down to the target error rate.

where

370

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 2, FEBRUARY 2002

VDSL system significantly. A practical suboptimal soft interference cancellation algorithm that performs soft interference cancellation is able to reduce the effects of the interference through iterative decoding. Combined with FEC, the algorithm is able to achieve the target error rates with very small loss in data rates. REFERENCES

Fig. 10.

Fig. 11.

BER for block iterative soft interference canceler.

Effect of interference on rate.

The previous sections show that the multiuser detector is able to perform sufficiently well. Given that the algorithm can reduce the BER to below target BER, Fig. 11 shows the effect of the cancellation for one crosstalker. The penalty for zeroing tones is small 2 but the gain from doing nothing about the interference is large. The margin loss when no cancellation is done over when the iterative soft cancellation is used, is about 5–10 dB depending on the length. The loop reach, defined as the maximum length the loop can support the target data rate, is shortened by 300 m if nothing is done. Although the algorithm adds complexity to the usual DMT receiver, the algorithm will be able to retake most of the loss that a home LAN transceiver imposes upon VDSL. VI. CONCLUSION This paper considers the case of interference of a home LAN transmission system into a DMT VDSL system. The interference from the home LAN can degrade the performance of a

[1] T. Starr, J. M. Cioffi, and P. J. Silverman, Understanding Digital Subscriber Line Technology. Englewood Cliffs, NJ: Prentice-Hall, 1999. [2] K. W. Cheong, J. Kim, J. M. Cioffi, H. Y. Kwon, Y. S. Chun, and K. H. Yoo, “The VDSL transmission challenge,” Eur. Trans. Telecom., vol. 9, pp. 145–154, Mar.–Apr. 1998. [3] K. W. Cheong and J. M. Cioffi, “Coexistence of 1 Mbps HPNA and DMT VDSL via multiuser detection and code division multiplexing,” T1E1.4: VDSL and Spectral Compatibility, Mar. 1999. [4] E. Baccarelli and S. Galli, “Minimum-error-probability single-user detection for ISI-impaired narrow-band multiuser systems,” IEEE Trans. Commun., vol. 49, pp. 1055–1062, June 2001. [5] K. W. Cheong, “Multiuser detection for digital subscriber line applications,” Ph.D. dissertation, Stanford University, Standord, CA, 2000. [6] W. J. Choi, K. W. Cheong, and J. M. Cioffi, “Iterative soft interference cancellation for MIMO wireless system”. In preparation. , “Iterative soft interference cancellation for multiple antenna sys[7] tems,” presented at the IEEE WCNC 2000, Chicago, IL, Sept. 2000. [8] S. Verdu, Multiuser Detection, Cambridge, U.K.: Cambridge Univ. Press, 1998. [9] P. Patel and J. Holtzman, “Analysis of a simple successive interference cancellation scheme in a DS/CDMA system,” IEEE J. Select. Areas Commun., vol. 12, pp. 796–807, June 1994. [10] M. Juntti, M. Latva-aho, and K. Kansanen, “Performance of parallel interference cancellation for CDMA with delay estimation,” in Proc 49th VTC, vol. 2, May 1999, pp. 1633–1667. [11] A. Gersho and T. L. Lim, “Adaptive cancellation of intersymbol interference for data transmission,” The Bell Sys. Tech. J., vol. 60, pp. 1997–2021, Nov. 1981. [12] K. W. Cheong, W. J. Choi, J. Fan, R. Negi, Z. N. Wu, and J. M. Cioffi, “Soft cancellation via iterative decoding to mitigate the effects of home-LANs on VDSL,” T1E1.4: VDSL and Spectral Compatibility, Aug. 1999.

Kok-Wui Cheong (S’95–M’01) received the B.A. degree (with highest honors) from the University of California at Berkeley, in 1994, and the M.S.E.E. and Ph.D.E.E. degrees from Stanford University, Stanford, CA, in 1995 and 2001, respectively. He is presently at Marvell Semiconductor, Inc., Sunnyvale, CA. His research interests include signal processing, coding and turbo decoding, multiuser detection, multicarrier modulation, and wireless communications. Dr. Cheong is a member of Phi Beta Kappa and Golden Key National Honor Society. He received the Percy Lionel Davis Award from Unversity of California at Berkeley in 1994.

Won-Joon Choi (S’98–M’01) received the B.S. and M.S. degrees in electrical engineering from Seoul National University, Seoul, Korea, in 1993 and 1995, respectively. He received M.S. and Ph.D. degrees in electrical engineering from Stanford University, Stanford, CA, in 1998 and 2001, respectively. From 1995 to 1996, he was with Korea Institute of Science and Technology, Seoul, Korea, where he was involved in the design of a high-precision digital controller for linear motors. Since March 2001, he has been with Atheros Communications, Sunnyvale, CA, working on OFDM systems for wireless LAN application. His research interests include wireless systems with multiple antennas, MIMO equalization, multicarrier modulation, and iterative (Turbo) decoding.

CHEONG et al.: MULTIUSER SOFT INTERFERENCE CANCELER VIA ITERATIVE DECODING FOR DSL APPLICATIONS

John M. Cioffi (S’77–M’78–SM’90–F’96) received the B.S.E.E. degree from the University of Illinois, Urbana-Champagne, in 1978 and the Ph.D.E.E. degree from Stanford University, Stanford, CA, in 1984. He was with Bell Laboratories, Holmdel, NJ, from 1978 to 1984 and IBM Research, San Jose, CA, from 1984 to 1986. He has been with Stanford University as an electrical engineering Professor from 1986 to present. He founded Amati Communications Corporation, Palo Alto, CA, in 1991 (it was purchased by Texas Instruments in 1997) and was officer/director from 1991 to 1997. He currently is on the boards or advisory boards of BigBand Networks, Coppercom, GoDigital, Ikanos, Ionospan, Ishoni, IteX, Marvell, Kestrel, Charter Ventures, and Portview Ventures, and is a Member of the US National Research Council’s CSTB. His specific interests are in the area of high-performance digital transmission. Dr. Cioffi received the following awards: IEEE Kobayashi Medal in 2001, IEEE Millennium Medal in 2000, IEE J.J. Tomson Medal in 2000, 1999 University of Illinois Outstanding Alumnus, 1991 IEEE COMMUNICATIONS MAGAZINE best paper, 1995 ANSI T1 Outstanding Achievement Award, and NSF Presidential Investigator from 1987 to 1992. He became a member of the National Academy of Engineering in 2001. He has published over 200 papers and holds over 40 patents, most of which are widely licensed, including basic patents on DMT, VDSL, and V-OFDM.

371