1. Introduction
Wireless Internet of Things (IoT) is now spreading rapidly due to the demand for big databases for machine learning-aided decision-making and control in sensor networks. Classical Bluetooth, as well as Bluetooth low energy (BLE), have been widely installed in commercial products that require power-saving functionality, such as sensors, remote control units, personal computer (PC) peripherals, smartwatches, and so on [1], [2]. The Bluetooth family utilizes Gaussian frequency-shift keying (GFSK) [3], [4], which achieves high power efficiency without nonlinear distortion in the power amplifier (PA) at the transmitter. Although GFSK is a classical modulation technique, it might be vital in constructing IoT information infrastructure. This paper focuses mainly on in-band full-duplex (IBFD) mutual communications for wireless IoT.
IBFD is a technique in which two nodes (terminals) simultaneously transmit and receive signals in the same frequency band. In recent years, the study of IBFD has attracted much attention from both theoretical and practical standpoints [5]-[7]. Even in spectrum utilization for 5G mobile communication systems, a reasonable implementation method is one of the topics of current interest [8]-[10]. Compared with half-duplex (HD), such as time division duplex (TDD) and frequency division duplex (FDD), the advantage of IBFD is that a 50% reduction in wireless resource occupancy can be achieved.
When nodes A and B cooperatively perform IBFD communication, node A transmits its own signal to node B and simultaneously receives the signal transmitted from node B. In addition to the signal arriving from node B, the signal of node A itself is included in the received signal at node A as self-interference (SI). SI is usually mitigated by a combination of passive and active interference cancellers [11]-[13]. In the passive canceller, an antenna structure is designed to enhance the path loss of the SI signals [13]. On the other hand, in the active canceller, SI is eliminated as much as possible by subtracting a replica of SI from the received signal. Ideally, the replica is regenerated because its own signal is perfectly known at the receiver of node A [11], [14]. Thus, in a broad sense, IBFD is a type of physical layer network-coded communication [15], [16].
However, the receiver of IBFD suffers from severe residual SI even after the passive interference cancellation, resulting in a low signal-to-interference power ratio (SIR). An analog-to-digital converter (ADC) is an essential interface with analog baseband signals for sophisticated digital signal processing in the physical layer. A lower SIR requires a higher resolution of ADC to avoid the disappearance of the desired signal component or fatal information loss, and it is not undesirable in terms of hardware implementation [17]-[19]. To alleviate the inconvenience caused by the low SIR, it is necessary to actively cancel SI in the analog domain at the front stage of the ADC [11], [20]. Typically, the active SI cancellation capability relies on the accuracy of the self-channel state information (CSI) of SI. In other words, the channel estimation should be conducted with the aid of a pilot sequence before invoking IBFD transmissions. Therefore, the synchronous frame format of the signals and medium access control (MAC) should be appropriately designed [21], [22]. Furthermore, in [12], [23], it is shown that analog front-end (AFE) impairments, such as the IQ imbalance of the IQ mixers, nonlinear distortion of the PA, and phase noise at the local oscillators (LOs), are crucial problems for the active canceller. As a result, it is subject to residual SI in the analog domain, and the residuals are suppressed by the additional active canceller in the digital domain after the ADC.
In many wireless IoT scenarios, the communication link establishment is event-driven. Nodes A and B are not always in a full-buffer state, i.e., there is a possibility not to have a data message to send, resulting in the HD mode. Nevertheless, to invoke the IBFD mode anytime, the CSI should be periodically updated at the expense of pilot overhead signals. Due to the increased overheads, IBFD is not suitable for event-driven communications. Because the amount of data is considered small, the data should be sent in HD mode instead of frequent transmission of pilot signals. Alternatively, it is also possible to estimate the CSI for every IBFD request. However, orthogonal pilot sequences should be synchronously sent from both nodes A and B. If the strength of the node B signal is low, the pilot contamination is small, even in the case of non-orthogonal pilot usage. In this paper, the target SIR ranges between \(-20\) and \(-10\) [dB] in indoor environments. It means relatively high strength of the node B signal, resulting in severe pilot contamination. To solve this problem, it is practical to use pilot overheads that are orthogonal to each other at nodes A and B.
In the event-driven scenario, asynchronous IBFD is preferable. Due to the asynchronous mode, it is impossible to guarantee the orthogonality of pilot sequences, resulting in “pilot contamination,” which induces residual SI after the active canceller. Asynchronous IBFD has been studied in a few papers so far [24]-[27]. However, most ideas rely on interference avoidance networking in MAC protocol aspects. Therefore, these papers motivate us to consider how to realize the effective asynchronous SI canceller in pilot contamination environments from the viewpoint of physical layer aspects.
Motivated by the above, this paper presents a differential active SI canceller (DASIC) that incorporates the principle of the differential codec. Without AFE impairments, the DASIC is capable of eliminating SI without self-CSI estimation. As a result, the communication links are asynchronously established, making them suitable for event-driven communications. However, the DASIC yields superposed signals of plural transmitted symbols, resulting in low reception sensitivity. This issue is relaxed by maximum a-posteriori probability (MAP) detection [28], [29]. Under the differential structure, on the premise of using an error correction code (ECC) technique of channel coding, iterative signal detection and decoding (IDD), which improves signal detection capability while exchanging the extrinsic log-likelihood ratio (LLR) between the MAP detector and the channel decoder [30]-[33], is also designed.
As a notable approach to reduce the computational complexity involved in the detection process, neural network (NN)-aided detectors attract attention for detecting signals or channel states under unknown statistical model behavior [34], [35]. In principle, wireless environments in the training phase of network structure should be the same as the test phase. Otherwise, the mismatch of the structure deteriorates detection capability. To overcome the penalty, the deep-unfolding technique [36], [37] is useful to improve the robustness against the model error. The proposed DASIC algorithm fully captures the statistical behavior by MAP algorithm with a few states. Therefore, there are no model mismatch errors, and the NN technique is structurally unnecessary.
The contributions of this paper are summarized as follows:
-
A DASIC for blind SI cancellation without self-CSI estimations, which enables asynchronous IBFD, is proposed.
-
To improve the detection capability, IDD for the DASIC is investigated from the standpoint of the packet error rate (PER) performance.
-
The negative effects of the AFE impairments are evaluated by computer simulations.
To the best of the authors’ knowledge, this is the first paper that proposes asynchronous IBFD with the aid of differential signal structure for blind SI cancellation in terms of physical layer aspects.
The rest of this paper is organized as follows. Section 2 presents a schematic of the IBFD transceiver for GFSK signaling in the context of the signal model. In Sect. 3, the DASIC algorithm for blind SI cancellation is proposed. Section 4 describes signal detection algorithms designed on the basis of observations of the DASIC output from standpoints of computational complexity and detection capability. The proposed method with and without AFE impairments is validated by computer simulations in Sect. 5. Finally, Sect. 6 concludes the paper with a summary.
The mathematical notation employed in this paper is as follows. The continuous time and discrete time indexes are denoted by \((t)\) and \([k]\), respectively. \(\mathbb{R}\) and \(\mathbb {C}\) represent the fields of real numbers and complex numbers, respectively. \(\Re \{\cdot \}\) indicates the real part of complex numbers. The imaginary unit \(\sqrt {-1}\) is denoted by \(\mathrm {j}\). \(\Pr[a|b]\) and \(p(a|b)\), respectively, represent the conditional probability mass function (PMF) and the probability density function (PDF) of an event \(a\) given the occurrence of an event \(b\). \(\mathbb{E}\left\{\cdot\right\}\) indicates an expected value.
2. Signal Model
This section formulates a signal model for the IBFD GFSK transceiver illustrated in Fig. 1. Nodes A and B simultaneously transmit and receive signals in the same frequency channel to communicate with each other. The transmitted RF signal \(s_i(t) \in \mathbb{R}\) of each A and B is expressed as
\[\begin{eqnarray*} &&\!\!\!\!\! s_i(t) = \sqrt{2} \alpha \Re \left\{ x_i(t) \xi_i(t)\right\}, \tag{1} \\ &&\!\!\!\!\! \xi_i(t) = \exp \left[\mathrm{j}(\omega_{i} t + \theta_i(t))\right], \tag{2} \end{eqnarray*}\] |
where \(i \in \{\mathrm{A}, \mathrm{B}\}\). \(\alpha\) is the amplitude of transmitted RF signal, and \(\omega_i = \omega_\mathrm{c} + \omega_i^\mathrm{o}\) is angle frequency with offset \(\omega_i^\mathrm{o}\), where \(\omega_\mathrm{c}\) is the center angle of frequency. More specifically, \(\omega_\mathrm{A} = \omega_\mathrm{c}+ \omega^\mathrm{o}_\mathrm{A}\) and \(\omega_\mathrm{B} = \omega_\mathrm{c}+ \omega^\mathrm{o}_\mathrm{B}\). It is noteworthy that \(\omega_\mathrm{A} \)is not equal to \(\omega_\mathrm{B}\). Furthermore, \(\theta_i(t) =\theta_i'(t) + \theta_i^\mathrm{o}\) is the phase noise with offset \(\theta_i^\mathrm{o}\), where \(\theta_i'(t)\) obeys random-walk. The complex-valued baseband (CBB) signal \(x_i(t) \in \mathbb{C}\) is represented by
\[\begin{equation*} x_i(t) = \exp \left[\mathrm{j} \phi_i(t)\right], \tag{3} \end{equation*}\] |
where \(\phi_i(t)\) is an information-bearing variable. Denoting the energy and time duration of one symbol by \(E_\mathrm{s}\) and \(T_\mathrm{s}\), respectively, the amplitude is expressed as \(\alpha = \sqrt{E_\mathrm{s}/T_\mathrm{s}}\). The amplitude is controlled by the variable gain amplifier (VGA) and PA with ideal characteristics.
Supposing that nodes A and B obey the same modulation rule, the information-bearing variable \(\phi_i(t)\) during the interval \(kT_\mathrm{s} \le t(= t' + kT_\mathrm{s}) < (k+1) T_\mathrm{s}\) is represented as
\[\begin{eqnarray*} \!\!\!\!\!\!\!\!\!\! \phi_i(t) = 2 \pi \eta \!\! \sum_{l=k-L+1}^{k} \!\!\!\!a_i[l] q( t' + (k - l) T_\mathrm{s}) +\pi \eta \sum_{l'=0}^{k-L} a_i[l'], \tag{4} \end{eqnarray*}\] |
where \(a_i[k] \in \{-1,1 \}\) is a message bit in a bipolar expression, \(\eta\) is a modulation index, and \(L\) is the memory size that is determined by \(B_\mathrm{G} T_\mathrm{s}\). Here, \(B_\mathrm{G}\) is the 3-dB sideband of the Gaussian filter. In this paper, minimum shift keying (MSK) with \((\eta=0.5, B_\mathrm{G} T_\mathrm{s}=\infty)\) and Gaussian filtered MSK (GMSK) with \((\eta=0.5, B_\mathrm{G} T_\mathrm{s}=0.5)\) are used.
The function \(q(t)\) represents a phase pulse, which is defined by [38]
\[\begin{equation*} q(t) = \int_{-\infty}^t g(\tau) d\tau, \tag{5} \end{equation*}\] |
under a constraint of
\[\begin{equation*} q(t) = \left\{ \begin{array}{cl} 0 & t \le 0 \\ 1/2 & t > L T_\mathrm{s} \end{array} \right. . \tag{6} \end{equation*}\] |
The function \(g(\tau)\) is a frequency pulse given by
\[\begin{eqnarray*} g(\tau) \!=\! \frac{1}{2T_\mathrm{s}} \left[Q\left( 2\pi B_\mathrm{G} \frac{\tau-\frac{T_\mathrm{s}}{2}}{\sqrt{\ln 2}}\right) -Q\left( 2\pi B_\mathrm{G} \frac{\tau+\frac{T_\mathrm{s}}{2}}{\sqrt{\ln 2}}\right) \right], \tag{7} \end{eqnarray*}\] |
where \(Q(\cdot)\) is the Q function.
In this paper, let us focus on the signal detection of node B’s message at node A1. The received RF signal \(r_{\mathrm{A}}(t)\) after the band-pass filter (BPF) is given by
\[\begin{eqnarray*} \!\!\!\!\!\!\!\! r_{\mathrm{A}}(t)=&& \Re \left\{ h_{\mathrm{AA}} \sqrt{2}\alpha x_\mathrm{A}(t+\tau_\mathrm{A}) \xi_\mathrm{A}(t+\tau_\mathrm{A}) \right\} \nonumber \\ && + \Re \left\{ h_{\mathrm{AB}} \sqrt{2}\alpha x_\mathrm{B}(t+\tau_\mathrm{B}) \xi_\mathrm{B}(t+\tau_\mathrm{B}) \right\} +n_\mathrm{A}(t) , \tag{8} \end{eqnarray*}\] |
where \(h_{\mathrm{AA}} \in \mathbb{C}\) and \(h_{\mathrm{AB}} \in \mathbb{C}\) are the complex-valued channel coefficients of the \(\mathrm{A}-\mathrm{A}\) and \(\mathrm{A}-\mathrm{B}\) links, respectively, which reflect the impacts of path loss, shadowing, and fading phenomena. \(h_{\mathrm{AA}}\) and \(h_{\mathrm{AB}}\) obey flat Rayleigh fading without frequency selectivity. The propagation delay time is denoted by \(\tau_i\). Furthermore, \(n_\mathrm{A}(t) \in \mathbb{R}\) is a noise term.
The CBB signal \(y_\mathrm{A}(t)\) after low-noise amplifier (LNA), VGA, IQ mixer, and ideal low-pass filter (LPF) processes is expressed as
\[\begin{eqnarray*} y_\mathrm{A}(t) &=& \sqrt{2}\left\{ r_\mathrm{A}(t) \xi_\mathrm{A}^*(t) \right\}_\mathrm{LPF} \nonumber \\ &=& h_{\mathrm{AA}} \kappa_\mathrm{AA}(t) \alpha x_\mathrm{A}(t+\tau_\mathrm{A}) \nonumber \\ &&+ h_{\mathrm{AB}} \kappa_\mathrm{AB}(t) \alpha x_\mathrm{B}(t+\tau_\mathrm{B}) + z_\mathrm{A}(t), \tag{9} \end{eqnarray*}\] |
where the noise term is \(z_\mathrm{A}(t) = \sqrt{2}\left\{n_\mathrm{A}(t) \xi^*_\mathrm{A}(t)\right\}_\mathrm{LPF}\), which is modeled by complex-valued Gaussian noise with zero mean and \(\beta \triangleq N_0/T_\mathrm{s}\) variance. Note that \(N_0\) is the noise energy for one symbol’s time duration, whereas \(\beta\) is the noise density. \(\kappa_{\mathrm{A}i}(t)\), (\(i \in \{ \mathrm{A}, \mathrm{B}\}\)), represents LO impairments of both nodes, which is given by
\[\begin{eqnarray*} &&\!\!\!\!\! \kappa_{\mathrm{A}i}(t) = \xi_{i}(t+\tau_{i})\xi^*_\mathrm{A}(t) = \kappa'_{\mathrm{A}i}(t) \kappa^\mathrm{o}_{\mathrm{A}i}, \tag{10} \\ &&\!\!\!\!\! \kappa'_{\mathrm{A}i}(t)= \exp \left[\mathrm{j}(\theta'_i(t+\tau_i)-\theta'_\mathrm{A}(t)) \right], \tag{11} \\ &&\!\!\!\!\! \kappa^\mathrm{o}_{\mathrm{AA}} = 1, \tag{12} \\ &&\!\!\!\!\! \kappa^\mathrm{o}_{\mathrm{AB}} = \exp \left[\mathrm{j}(\omega_\mathrm{B}^\mathrm{o}-\omega_\mathrm{A}^\mathrm{o}) \right] \exp \left[\mathrm{j}(\theta_\mathrm{B}^\mathrm{o}-\theta_\mathrm{A}^\mathrm{o}) \right]. \tag{13} \end{eqnarray*}\] |
In IBFD systems, the longer distance between nodes A and B induces a stronger SI because \(|h_{\mathrm{AA}}|^2\) is much higher than \(|h_{\mathrm{AB}}|^2\). Now, let us denote the SIR by
\[\begin{equation*} \zeta = \frac{|h_{\mathrm{AB}}|^2}{|h_{\mathrm{AA}}|^2}. \tag{14} \end{equation*}\] |
In principle, the signal components of \(h_{\mathrm{AB}}x_\mathrm{B}(t)\) disappear or deteriorate after the ADC while it is subject to the huge difference between \(|h_{\mathrm{AA}}|^2\) and \(|h_{\mathrm{AB}}|^2\), i.e., extremely low \(\zeta\). Thus, the SI of the first term of the right-hand side in Eq. (8) should be canceled before the ADC process, i.e., in the analog domain. Assuming that \(h'_\mathrm{AA} \triangleq h_\mathrm{AA} \alpha \xi_\mathrm{A}(t+\tau_\mathrm{A})\) is accurately estimated at the receiver, a typical active SI canceller (ASIC) ideally subtracts the replica of the SI from the received signal as
\[\begin{equation*} r_\mathrm{A}(t) - \Re \left\{ h'_\mathrm{AA} x_\mathrm{A}(t+\tau_\mathrm{A}) \right\}. \tag{15} \end{equation*}\] |
Instead of using an ASIC, this study employs a DASIC for blindly canceling the SI in a regime of differential detection without knowledge of \(h_\mathrm{AA} \alpha \xi_\mathrm{A}(t+\tau_\mathrm{A})\). The CBB signal \(\tilde{y}_\mathrm{A}(t)\) is extracted from the output of the DASIC. Finally, the MAP detector yields the estimates \(\hat{a}_\mathrm{B}[k]\) of node B’s message.
3. Principle of DASIC
A schematic of the DASIC is illustrated in Fig. 2, which is intended as an analog circuit. It is assumed that an analog multiplier is used for division and a mixer is used for phase adjustment; hence, a significant increase in power consumption is not expected owing to the use of passive elements. The problem arising here is the realization of a delay of one symbol duration of an analog signal. This paper assumes that this delay can be achieved ideally. There are still many issues to be solved in the implementation of analog circuits, which we regard as a future issue2.
More specifically, by observing the CBB signal \(x_\mathrm{A}(t)\), a phase shift is generated as
\[\begin{equation*} \psi_\mathrm{A}(t) = \frac{x_\mathrm{A}(t)}{x_\mathrm{A}(t-T_\mathrm{s})}. \tag{16} \end{equation*}\] |
Then, assuming an ideal delay circuit, the phase of a delayed CBB signal \(y_\mathrm{A}(t-T_\mathrm{s})\) is shifted by \(\psi_\mathrm{A}(t)\) at the phase shifter. Denoting \(t_{-} = t-T_\mathrm{s}\) to simplify the mathematical notations, we have the modified differential signal, which is represented as
\[\begin{eqnarray*} y_\mathrm{A}(t_{-})\psi_\mathrm{A}(t) &=& h_{\mathrm{AA}} \alpha x_\mathrm{A}(t) + \varepsilon_\mathrm{A}(t) \nonumber \\ && + h_{\mathrm{AB}} \kappa_\mathrm{AB}(t) \alpha x_\mathrm{B}(t_{-}+\tau_\mathrm{B})\psi_\mathrm{A}(t) \nonumber \\ && + z_\mathrm{A}(t_{-})\psi_\mathrm{A}(t), \tag{17} \end{eqnarray*}\] |
where
\[\begin{eqnarray*} \varepsilon_\mathrm{A}(t) = h_{\mathrm{AA}} \alpha \left[ \kappa_\mathrm{AA}(t) x_\mathrm{A}(t+\tau_\mathrm{A}) -x_\mathrm{A}(t)\right]. \tag{18} \end{eqnarray*}\] |
Equations (10)-(12) indicate that \(\varepsilon_\mathrm{A}(t)\) is zero if the propagation delay \(\tau_\mathrm{A}\) of SI is zero. In other words, the additional noise component \(\varepsilon_\mathrm{A}(t)\) is induced by the propagation delay time \(\tau_\mathrm{A}\).
Eventually, the analog interference canceller is operated as
\[\begin{eqnarray*} \tilde{y}_\mathrm{A}(t) &=& y_\mathrm{A}(t) - y_\mathrm{A}(t_{-})\psi_\mathrm{A}(t) \nonumber \\ &=& \tilde{h}_\mathrm{AB} \alpha \tilde{x}_{\mathrm{B}}(t+\tau_\mathrm{B}) + \tilde{\varepsilon}_\mathrm{A}(t)+\tilde{z}_\mathrm{A}(t), \tag{19} \end{eqnarray*}\] |
where we have
\[\begin{eqnarray*} \tilde{h}_\mathrm{AB} &=& h_\mathrm{AB} \kappa^\mathrm{o}_\mathrm{AB}, \tag{20} \\ \tilde{x}_\mathrm{B}(t+\tau_\mathrm{B}) &=& x_\mathrm{B}(t+\tau_\mathrm{B}) - \psi_\mathrm{A}(t) x_\mathrm{B}(t_{-}+\tau_\mathrm{B}), \tag{21} \\ \tilde{\varepsilon}_\mathrm{A}(t) &=& \varepsilon_\mathrm{A}(t) + \tilde{h}_\mathrm{AB} [\kappa'_\mathrm{AB}(t)-1] \alpha x_\mathrm{B}(t+\tau_\mathrm{B}) \nonumber \\ && \hspace{-9.5mm} -\tilde{h}_\mathrm{AB} [\kappa'_\mathrm{AB}(t_{-})-1] \psi_\mathrm{A}(t) \alpha x_\mathrm{B}(t_{-}+\tau_\mathrm{B}), \tag{22} \\ \tilde{z}_\mathrm{A}(t) &=& z_\mathrm{A}(t) - \psi_\mathrm{A}(t) z_\mathrm{A}(t_{-}). \tag{23} \end{eqnarray*}\] |
\(\tilde{\varepsilon}_\mathrm{A}(t)\) denotes the residual SI after the DASIC process that is induced by the AFE impairments. Eq. (22) implies that the residual SI \(\tilde{\varepsilon}_\mathrm{A}(t)\) is zero only if \(\theta'_\mathrm{A}(t) = \theta'_\mathrm{B}(t+\tau_\mathrm{B})\) and \(\tau_\mathrm{A}=0\). More specifically, if \(\theta'_\mathrm{A}(t) = \theta'_\mathrm{B}(t+\tau_\mathrm{B}), \kappa'_\mathrm{AB}(t)\) of Eq.(11) is one for any t, resulting in \(\tilde{\varepsilon}_\mathrm{A}(t)=\varepsilon_\mathrm{A}(t)\) from Eq.(22). On the other hand, if \(\tau_\mathrm{A}=0\), we derive \(\kappa_\mathrm{AA}(t)=1\) from Eqs.(10)-(12), resulting in \(\varepsilon_\mathrm{A}(t)=0\) from Eq.(18). As the result, we have \(\tilde{\varepsilon}_\mathrm{A}(t)=0\).
Figure 3 shows eye diagrams of the DASIC output for MSK and GMSK (\(B_\mathrm{G} T_\mathrm{s}=0.5\)) signaling in an ideal case of \(\tau_\mathrm{A}=\tau_\mathrm{B}=0\) without AFE impairments. For the visualization, the noise term \(z_\mathrm{A}(t)\) is zero and \(\tilde{h}_\mathrm{AB}\alpha=1\). In both cases, the eye apertures are maximized every \(2(k+1)T_\mathrm{s}\) and \(2kT_\mathrm{s}\) in the real and imaginary amplitudes, respectively. However, in GMSK, due to the presence of inter-symbol interference (ISI) induced by Gaussian filtering, the aperture is reduced.
Fig. 3 Eye diagrams of the DASIC output \(\tilde{y}_\mathrm{A}(t)\) for MSK and GMSK: \(\eta=0.5\) where \(\tilde{h}_\mathrm{AB}\alpha=1\) without AFE impairments. |
Assuming the ideal sampling time at \(t=kT_\mathrm{s} + \delta\) that maximizes the eye aperture, the ADC of Eq. (19) yields
\[\begin{eqnarray*} \tilde{y}_\mathrm{A}[k] &=& \tilde{h}_\mathrm{AB} \alpha \tilde{x}_{\mathrm{B}}[k] + \tilde{\varepsilon}_\mathrm{A}[k]+\tilde{z}_\mathrm{A}[k], \tag{24} \end{eqnarray*}\] |
where we have
\[\begin{eqnarray*} \tilde{x}_\mathrm{B}[k] &=& x_\mathrm{B}[k] - \psi_\mathrm{A}[k] x_\mathrm{B}[k-1], \tag{25} \\ \tilde{z}_\mathrm{A}[k] &=& z_\mathrm{A}[k] - \psi_\mathrm{A}[k] z_\mathrm{A}[k-1]. \tag{26} \end{eqnarray*}\] |
Equation (24) implies that \(\tilde{y}_\mathrm{A}[k]\) is represented by a simple linear model where \(\tilde{x}_\mathrm{B}[k]\) is given by the superposed CBB of \(x_\mathrm{B}[k]\) and \(x_\mathrm{B}[k-1]\).
The second moments of \(\tilde{x}_\mathrm{B}[k]\) and \(\tilde{z}_\mathrm{A}[k]\) are given by \(\mathbb{E} \left\{ |\tilde{x}_\mathrm{B}[k]|^2 \right\} = 2\mu\), (\(0 \le \mu \le 1\)) and \(\mathbb{E} \left\{ |\tilde{z}_\mathrm{A}[k]|^2 \right\} = 2\beta = 2 \frac{N_0}{T_\mathrm{s}}\), respectively. Figure 4 characterizes equivalent signal density \(\mathbb{E}\left\{|\tilde{x}_\mathrm{B}[k]|^2\right\}= 2\mu\) at the continuous-time \(t\) according to the delay time of the node B \(\tau_\mathrm{B}\). The value of \(\mu\) is maximized at the timing \(kT_\mathrm{s}\) by adjusting the sample timing \(\delta\) of ADC. As shown in (a), MSK can keep \(\mu=1\) if \(\delta\) is appropriate. On the other hand, GMSK with \(B_\mathrm{G}T_\mathrm{s}=0.5\) in (b) is subject to the energy loss caused by the delay time of the node B \(\tau_\mathrm{B}\). The maximum loss from the ideal delay time \(\tau_\mathrm{B}=0\) is \(10 \log_{10} \frac{1.80}{1.68}=0.3\) [dB] at \(\tau_\mathrm{B}=T_\mathrm{s}/2\). Note that the curves of \(\tau_\mathrm{B}=T_\mathrm{s}/4\) and \(3T_\mathrm{s}/4\) are almost the same because of the phase-circularity. In the case of asynchronous IBFD, structurally, \(\tau_\mathrm{B}\) cannot maintain at zero. However, the maximum loss is only 0.3 [dB]; thus, the negative effect is not significant. From this point forward, we assume \(\tau_\mathrm{B}=0\) for ease of discussions in this paper.
Fig. 4 Equivalent signal density \(\mathbb{E}\left\{|\tilde{x}_\mathrm{B}[k]|^2\right\}= 2\mu\) at the continuous time \(t\) according to the delay time of the node B \(\tau_\mathrm{B}\). |
The signal-to-interference plus noise power ratio (SINR) of the DASIC output is given by
\[\begin{eqnarray*} \rho &=& \frac{ \mathbb{E} \left\{\left|\tilde{h}_{\mathrm{AB}} \alpha \tilde{x}_\mathrm{B}[k] \right|^2 \right\}}{\mathbb{E} \left\{ \left| \tilde{\varepsilon}_\mathrm{A}[k] + \tilde{z}_\mathrm{A}[k] \right|^2 \right\} } = \frac{2\left|\tilde{h}_{\mathrm{AB}}\right|^2 \alpha^2 \mu }{\mathbb{E} \left\{ \left|\tilde{\varepsilon}_\mathrm{A}[k] \right|^2 \right\} + 2\beta} \nonumber \\ &=& \frac{1}{\frac{\mathbb{E} \left\{ \left|\tilde{\varepsilon}_\mathrm{A}[k] \right|^2 \right\}}{2\left|\tilde{h}_{\mathrm{AB}}\right|^2 \alpha^2 \mu } +\left(\mu |h_\mathrm{AB}|^2\frac{E_\mathrm{s}}{N_0} \right)^{-1} }. \tag{27} \end{eqnarray*}\] |
To demonstrate the validity of the DASIC, in terms of the interference suppression capability, Fig. 5 exhibits the SINR \(\rho\) property of the DASIC output against \(\zeta=|h_\mathrm{AB}|^2/|h_\mathrm{AA}|^2\) and \(\tau_{\mathrm{A}}\). As an example, the instantaneous \(|h_\mathrm{AB}|^2\frac{E_\mathrm{s}}{N_0}\) is 10 [dB]. The phase noise at the LOs of the transmitter and receiver is emulated by a model of the phased lock loop (PLL) based CMOS frequency synthesizer with the power spectrum density (PSD). In accordance with the requirements for Bluetooth applications, the PSD is defined as \(-89\) [dBc/Hz] at 500 [kHz] and \(-121\) [dBc/Hz] at 2 [MHz]. The symbol rate \(1/T_\mathrm{s}\) is 1 [MHz]. In Fig. 5(a), the delay time is \(\tau_\mathrm{A} \in \{0, 10^{-9}, 10^{-6}\}\) [sec]. In Fig. 5(b), the value of \(\zeta=|h_{\mathrm{AB}}|^2/|h_{\mathrm{AA}}|^2\) is \(\{-20, -15, -10\}\) [dB]. As a comparison with the traditional IBFD, the performance of the ASIC is depicted in the figure. In the ASIC, the channel state of \(h_\mathrm{AA}\alpha \xi_\mathrm{A}(t+\tau_\mathrm{A})\) is estimated by the least square (LS) criterion with the aid of a 16-bit pilot sequence. Note that the 16-bit pilot sequences of nodes A and B are not orthogonal due to asynchronous IBFD.
Fig. 5 SINR with phase noise impairments: Dashed and solid lines are of the ASIC and DASIC, respectively. |
Let us focus on Fig. 5(a). In the case of \(\tau_\mathrm{A}\) = 0 [sec], the phase noise behavior can be completely eliminated by the IQ mixer in the receiver of node A. The ASIC suffers from pilot contamination due to asynchronous IBFD, resulting in lower SINR due to residual SI. In the case of \(\tau_\mathrm{A}\) = \(10^{-9}\) [sec] = 1 [nsec], the SINR is severely degraded if \(\zeta\) is low. This behavior makes it difficult to implement IBFD. If \(\tau_\mathrm{A}\) = \(10^{-6}\) [sec] = 1 [\(\mu\)sec], the SINR of the DASIC is worse than that of the ASIC. This is because the differential structure is broken. However, because the communication distance is short, the probability that \(\tau_\mathrm{A}\) = 1 [\(\mu\)sec] will occur is low. Next, let us move our focus to Fig. 5(b). The SINR of DASIC is higher than ASIC when \(\tau_{\mathrm{A}}\) is shorter than \(300\) [nsec] when \(\zeta=|h_{\mathrm{AB}}|^2/|h_{\mathrm{AA}}|^2=-20\) [dB] of the lowest target in this paper. The figure emphasizes the importance of phase noise behavior in IBFD considerations.
4. MAP Detector for DASIC Output
As an example, let us consider GFSK signaling with \(B_\mathrm{G}T_\mathrm{s}\), which can be fully captured by a memory size of \(L=3\). Denoting a weight factor as \(w_l \triangleq 2\pi \eta q(\varDelta t + l T_\mathrm{s})\), (\(l \in \{0, 1, 2 \}\)) for Gaussian spectrum shaping, the components \(x_\mathrm{B}[k]\) and \(x_\mathrm{B}[k-1]\) in the superposed CBB signal \(\tilde{x}_\mathrm{B}[k]\) of Eq. (25) are expressed as
\[\begin{eqnarray*} \!\! x_\mathrm{B}[k] \!\! &=& \!\! \exp \left\{ \mathrm{j} (w_0 a_\mathrm{B}[k] + w_1 a_\mathrm{B}[k-1] \right. \nonumber \\ &&\left. \qquad+ w_2 a_\mathrm{B}[k-2]) + \mathrm{j}\sigma[k]\right\}, \tag{28} \\ \!\! x_\mathrm{B}[k-1] \!\! &=& \!\! \exp \left\{ \mathrm{j} \left(w_0 a_\mathrm{B}[k-1] + w_1 a_\mathrm{B}[k-2] \right) \right. \nonumber \\ &&\left. \qquad + \mathrm{j}\sigma[k]\right\}, \tag{29} \end{eqnarray*}\] |
where \(\sigma[k]\) denotes a state that is defined by
\[\begin{eqnarray*} \sigma[k] &=& \pi \eta \sum_{l'=0}^{k-3} a_\mathrm{B}[l']. \tag{30} \end{eqnarray*}\] |
On the other hand, the phase shift \(\psi_\mathrm{A}[k]\) in Eq. (25) is given by
\[\begin{eqnarray*} \psi_\mathrm{A}[k] &=& \exp\left\{ \mathrm{j} w_0 \left(a_\mathrm{A}[k]-a_\mathrm{A}[k-1]\right) \right. \nonumber \\ && \qquad + \mathrm{j} w_1 \left(a_\mathrm{A}[k-1]-a_\mathrm{A}[k-2]\right) \nonumber \\ && \left. \qquad + \mathrm{j} \pi \eta a_\mathrm{A}[k-2] \right\}. \tag{31} \end{eqnarray*}\] |
4.1 MSK Signaling
For an intuitive understanding of the structure of the superposed CBB signal, at first, let us consider MSK signaling, i.e., \(\eta=0.5\) and \(B_\mathrm{G} T_\mathrm{s} = \infty\). In this case, the principal values, in terms of the exponential function, of \(\sigma[k]\) are one of four states: \(\mathcal{U} = \left\{0, \frac{\pi}{2}, \pi,\frac{3\pi}{2} \right\}\). When the ADC samples at an appropriate timing \(\varDelta t\) that maximizes the eye aperture, the weight factors are \(w_0=0\) and \(w_1=w_2=\pi/2\), resulting in
\[\begin{eqnarray*} \!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\! && x_\mathrm{B}[k] = \exp \left\{\mathrm{j}\frac{\pi}{2} (a_\mathrm{B}[k-1]+ a_\mathrm{B}[k-2] ) + \mathrm{j}\sigma[k] \right\}, \tag{32} \\ \!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\! && x_\mathrm{B}[k-1] = \exp \left\{\mathrm{j}\frac{\pi}{2} a_\mathrm{B}[k-2] + \mathrm{j}\sigma[k]\right\}, \tag{33} \\ \!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\! && \psi_\mathrm{A}[k] = \exp\left\{ \mathrm{j}\frac{\pi}{2}a_\mathrm{A}[k-1]\right\}. \tag{34} \end{eqnarray*}\] |
Now, denoting \(\delta[k] = a_\mathrm{B}[k] - a_\mathrm{A}[k] \in \{-2,0,2\}\), Eq. (25) is rewritten as
\[\begin{eqnarray*} \tilde{x}_\mathrm{B}[k] &=& \exp \left\{\mathrm{j}\frac{\pi}{2} (a_\mathrm{B}[k-1]+ a_\mathrm{B}[k-2] ) + \mathrm{j}\sigma[k] \right\} \nonumber \\ &&- \exp \left\{\mathrm{j}\frac{\pi}{2} (a_\mathrm{B}[k-1]+a_\mathrm{B}[k-2]) + \mathrm{j}\sigma[k]\right\} \nonumber \\ &=& \mathrm{j} \delta[k-1] \exp \left\{\mathrm{j}\frac{\pi}{2} a_\mathrm{B}[k-2] + \mathrm{j}\sigma[k] \right\} \nonumber \\ &=& \left\{ \begin{array}{cc} 2 \exp[\mathrm{j}u_\mathrm{A}[k]], & (\delta[k-1] \neq 0) \\ 0, & (\delta[k-1] = 0) \end{array}, \right. \tag{35} \end{eqnarray*}\] |
where we have
\[\begin{equation*} u_\mathrm{A}[k]= \frac{\pi}{2}\left( a_\mathrm{B}[k-2]+ \frac{\delta[k-1]}{2}\right)+ \sigma[k] \in \mathcal{U}. \tag{36} \end{equation*}\] |
Equation (35) implies that the superposed CBB \(\tilde{x}_\mathrm{B}[k+1]\) is always zero if node B’s information \(a_\mathrm{B}[k]\) is identical to node A’s information \(a_\mathrm{A}[k]\). Otherwise, \(\tilde{x}_\mathrm{B}[k+1]\) belongs to one of the states \(\mathcal{U}\).
An example of a scatter diagram of the DASIC outputs \(\tilde{y}_\mathrm{A}[k]\) is depicted in Fig. 6. The Euclidean distance from the DASIC output \(\tilde{y}_\mathrm{A}[k]\) to each of the five states \(\mathcal{X}=\{0, 2\exp[\mathrm{j}\mathcal{U}]\}=\{0, 2, 2\mathrm{j},-2,-2\mathrm{j}\}\) obeys the complex-valued Gaussian distribution with zero mean and \(2\beta\) variance. When the occurrences of \(a_\mathrm{A}[k]= \pm 1\) and \(a_\mathrm{B}[k]= \pm 1\) are equiprobable, the occurrence probability of \(\tilde{x}_\mathrm{B}[k]\) is given by
\[\begin{eqnarray*} &&\!\!\!\!\! \Pr[\tilde{x}_\mathrm{B}[k]=0] = 1/2, \tag{37} \\ &&\!\!\!\!\! \Pr[\tilde{x}_\mathrm{B}[k]=\{2, 2\mathrm{j},-2,-2\mathrm{j}\}] = 1/8. \tag{38} \end{eqnarray*}\] |
Therefore, the threshold value for simple hard decision is set to \(\pm 1\), which is the stochastic midpoint. According to (35), a criterion for the simple hard decision is formulated as
\[\begin{equation*} \hat{a}_\mathrm{B}[k-1] = \left\{ \begin{array}{cc} a_\mathrm{A}[k-1], & |\tilde{x}_\mathrm{B}[k]|<|\tilde{h}_{\mathrm{AB}}|\alpha\\ -a_\mathrm{A}[k-1], & \mathrm{others} \end{array} \right. . \tag{39} \end{equation*}\] |
The bits of nodes A and B are the same (\(a_\mathrm{A}[k-1]=a_\mathrm{B}[k-1]\)), \(|\tilde{x}_\mathrm{B}[k]|\) is inside the circle with radius \(|\tilde{h}_{\mathrm{AB}}|\alpha\). Otherwise, \(|\tilde{x}_\mathrm{B}[k]|\) is outside the circle. This method does not request phase information of \(h_{\mathrm{BA}}\) and the computational complexity is extremely low. However, probabilistic behavior cannot be captured.
For optimal detection in Gaussian channels, the information bit \(a_\mathrm{B}[k]\) coming from node B to node A is derived by finding the maximum a-posteriori probability (MAP) as
\[\begin{equation*} \hat{a}_\mathrm{B}[k] = \arg \max_{a\in \{\pm 1\}} \Pr[a_\mathrm{B}[k]=a|\tilde{y}_\mathrm{A}[k+1]]. \tag{40} \end{equation*}\] |
Recalling the relationship discussed in Eq. (35), with the aid of perfect knowledge on the own message \(a_\mathrm{A}[k]\), the constituent a-posteriori probability is obtained by
\[\begin{eqnarray*} &&\!\!\!\!\! \Pr[a_\mathrm{B}[k]=a_\mathrm{A}[k]|\tilde{y}_\mathrm{A}[k+1]] \nonumber \\ &&\!\!\!\!\! \qquad= \Pr[\tilde{x}_\mathrm{B}[k+1]=0|\tilde{y}_\mathrm{A}[k+1]], \tag{41} \\ &&\!\!\!\!\! \Pr[a_\mathrm{B}[k]=-a_\mathrm{A}[k]|\tilde{y}_\mathrm{A}[k+1]] \nonumber \\ &&\!\!\!\!\! \qquad= \Pr[\tilde{x}_\mathrm{B}[k+1] \neq 0|\tilde{y}_\mathrm{A}[k+1]], \tag{42} \end{eqnarray*}\] |
where
\[\begin{eqnarray*} \!\!\!\!&&\Pr[\tilde{x}_\mathrm{B}[k+1] \neq 0|\tilde{y}_\mathrm{A}[k+1]] \nonumber \\ \!\!\!\!&&= \sum_{x \in \{2, 2\mathrm{j},-2,-2\mathrm{j}\}} \Pr[\tilde{x}_\mathrm{B}[k+1] = x|\tilde{y}_\mathrm{A}[k+1]]. \tag{43} \end{eqnarray*}\] |
On the basis of Bayes’ theorem, the a-posteriori probability is rewritten as
\[\begin{eqnarray*} &&\!\!\!\!\! \Pr[\tilde{x}_\mathrm{B}[k]=x|\tilde{y}_\mathrm{A}[k]] \nonumber \\ &&\!\!\!\!\! \qquad= \frac{ p(\tilde{y}_\mathrm{A}[k]|\tilde{x}_\mathrm{B}[k]=x) \Pr[\tilde{x}_\mathrm{B}[k]=x] } { p(\tilde{y}_\mathrm{A}[k]) }, \tag{44} \end{eqnarray*}\] |
where \(p(\tilde{y}_\mathrm{A}[k]|\tilde{x}_\mathrm{B}[k]=x)\) is the PDF given by
\[\begin{eqnarray*} &&\!\!\!\!\! p(\tilde{y}_\mathrm{A}[k]|\tilde{x}_\mathrm{B}[k]=x) \nonumber \\ &&\!\!\!\!\! \qquad= \frac{1}{2 \pi \beta} \exp \left[-\frac{\left|\tilde{y}_\mathrm{A}[k]-\tilde{h}_\mathrm{AB} \alpha x\right|^2}{2\beta} \right]. \tag{45} \end{eqnarray*}\] |
Note that \(p(\tilde{y}_\mathrm{A}[k])\) is a constant value in terms of the search problem of the maximum value in Eq. (40). Thus, we may replace \(p(\tilde{y}_\mathrm{A}[k])\) with unity.
4.2 GMSK Signaling
In GMSK signaling, we must pay attention to the fact that we should take into account the infinite impulse response (IIR) filter structure of Eq. (4) to fully capture the amount of mutual information between \(\tilde{y}_\mathrm{A}[k]\) and \(a_\mathrm{B}[k]\). Here, let us investigate the MAP detector for the IIR-filtered signal, which can achieve optimal performance in terms of probabilistic theory. According to the MAP framework, the a-posteriori LLR is defined by
\[\begin{eqnarray*} \lambda_\mathrm{B}[k] &=& \ln \frac{\Pr[a_\mathrm{B}[k]=+1| \left\{\tilde{y}_\mathrm{A}[k]\right\}]}{\Pr[a_\mathrm{B}[k]=-1|\left\{\tilde{y}_\mathrm{A}[k]\right\}]}, \tag{46} \end{eqnarray*}\] |
where \(\left\{\tilde{y}_\mathrm{A}[k]\right\}\) indicates a sequence of \(\tilde{y}_\mathrm{A}[k]\). To compute the LLR \(\lambda_\mathrm{B}[k]\) with reasonable computational efforts, we focus on the IIR filter structure of Eq. (4).
Figure 7 illustrates the filter structure using memory size \(L=3\) as an example. On the basis of the trellis diagram depicted from Fig. 7, the LLR can be obtained by the Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm [28] without requiring a large computational burden3. Assuming BCJR is applied for GFSK demodulation in both ASIC and DASIC, the complexity relies on the number of states in the BCJR algorithm. In this paper, \(L = 3\) is used for \(B_\mathrm{G}T_\mathrm{s}\) = 0.5 pulse shaping of both ASIC and DASIC. If \(B_\mathrm{G}T_\mathrm{s}\) is smaller than 0.5, the \(L\) should be a larger value than 3, resulting in a large number of states. In this paper, the number of states is negligibly small, i.e., \(4^{L-1}\) = 16 states. It is equivalent to binary convolutional code with constraint length 4. Thus, the complexity is not so high.
Fig. 7 Structure of IIR filter of signal component \(\tilde{x}_\mathrm{B}[k]\) included in DASIC output \(\tilde{y}_\mathrm{A}[k]\). |
Here, one element of the Cartesian product set (four states) of \(a_\mathrm{B}[k-1]=\{\pm 1 \}\) and \(a_\mathrm{B}[k-2]=\{\pm 1 \}\) is represented by \(\sigma_1\). In addition, one element of the four-state set \(\mathcal{U}\) is represented by \(\sigma_2\). From these states \(\sigma_1\) and \(\sigma_2\) as well as the DASIC input \(a_\mathrm{B}[k]\), the superposed CBB signal \(\tilde{x}_\mathrm{B}[k]\) can be reproduced, and the input/output relationship is denoted by \(\tilde{x}_\mathrm{B}[k] = f(a_\mathrm{B}[k], \sigma_1, \sigma_2)\). The transition (joint) probability required in the BCJR process is given by
\[\begin{eqnarray*} &&\!\!\!\!\! \Pr\left[a_\mathrm{B}[k]=\{ \pm 1\}, \sigma_1, \sigma_2|\tilde{y}_\mathrm{A}[k]\right] \nonumber \\ &&\!\!\!\!\! \propto \exp \left\{-\frac{\left| \tilde{y}_\mathrm{A}[k] - \tilde{h}_\mathrm{AB} \alpha f(a_\mathrm{B}[k], \sigma_1,\sigma_2)] \right|^2}{2 \beta}\right\} \nonumber\\ &&\!\!\!\!\! \quad \cdot \exp \left\{ a_\mathrm{B}[k]\frac{\gamma_\mathrm{B}[k]}{2}\right\}, \tag{47} \end{eqnarray*}\] |
where \(\gamma_\mathrm{B}[k]\) is the a-priori LLR, which represents the confidence in the prior knowledge of \(a_\mathrm{B}[k]\), and it is defined by
\[\begin{equation*} \gamma_\mathrm{B}[k] = \ln \frac{\Pr[a_\mathrm{B}[k]=+1]}{\Pr[a_\mathrm{B}[k]=-1]}. \tag{48} \end{equation*}\] |
Note that \(\gamma_\mathrm{B}[k]\) is zero if there is no prior information.
4.3 IDD Receiver
If ECC and an interleaver (\(\Pi\)) are used at the transmitter side, it is possible to perform IDD, in which signal detection is achieved by exchanging extrinsic LLRs between the MAP detector and the error correction decoder [31].
Figure 8 shows the schematic of the IDD receiver. With the aid of the a-priori LLR \(\gamma_\mathrm{B}[k]\), Eq. (46) calculates the a-posteriori LLR \(\lambda_\mathrm{B}[k]\). Subsequently, the extrinsic LLR is obtained by subtracting the a-priori LLR \(\gamma_\mathrm{B}[k]\) from the a-posteriori LLR \(\lambda_\mathrm{B}[k]\). The resulting extrinsic LLR is deinterleaved (\(\Pi^{-1}\)) and applied to the channel decoder. The extrinsic LLR is updated at the channel decoder after the error correction process. The updated LLR is fed back to the MAP detector via the interleaver as the a-priori LLR \(\gamma_\mathrm{B}[k]\). After repeating these LLR exchanges, the decision value of the information bit is obtained from the channel decoder.
Note that the computational complexity of the iteration process linearly increases according to the allowed number of iterations. Thus, the number of states in BCJR is a dominating factor in terms of the complexity of ASIC and DASIC.
4.4 Channel Estimations
To carry out the MAP detection of Eqs. (40) and (46), the values \(h_\mathrm{AB}\) and \(\beta\) are estimated from the preamble. Now, we assume that an \(M\)-bit pilot sequence is appended in front of the data sequence. Based on the LS criterion, the estimated values can be obtained by
\[\begin{eqnarray*} &&\!\!\!\!\! \hat{h}_\mathrm{AB} = \frac{\sum_{k=1}^{M} \tilde{y}_\mathrm{A}[k]\tilde{x}_\mathrm{B}[k]^*}{\alpha \sum_{k=1}^{M} \left|\tilde{x}_\mathrm{B}[k] \right|^2}, \tag{49} \\ &&\!\!\!\!\! \hat{\beta} = \frac{1}{M} \sum_{k=1}^{M} \frac{|\tilde{y}_\mathrm{A}[k]|^2}{\alpha^2} - \left| \hat{h}_\mathrm{AB} \right|^2. \tag{50} \end{eqnarray*}\] |
As shown in Eq.(24), the signal model after SI cancellation is characterized by the single-input single-output (SISO) aditive white Gaussian noise (AWGN) model, assuming that random components \(\tilde{\varepsilon}_\mathrm{A}[k] + \tilde{z}_\mathrm{A}[k]\) obey Gaussian distribution. In this simple signal model, the typical channel estimation is LS estimation. If long-term statistics of the channel state (\(\mathbb{E}\{|h_\mathrm{AB}|^2\}\) are available, MAP estimation with high accuracy is feasible even in the channel estimation, but such long-term statistics are not available because we assume random access in the IoT scenario. Iterative channel estimation is a promising technique for IDD structures. However, owing to space limitations in this paper, we do not evaluate the effect of iterative channel estimation in simulations.
5. Numerical Results
Computer simulations were conducted to verify the effectiveness of the proposed DASIC. The simulation conditions are summarized in Table 1. The modulation scheme is GMSK (\(\eta=0.5\), \(B_\mathrm{G}T_\mathrm{s}=0.5\), \(L=3\)), and the MAP algorithm based on the Jacobian logarithm is used for its demodulation. At this time, to cope with the tail bit problem of the MAP demodulator, dummy bits of \(L-1\) length are appended after the information data block. In the non-coded scenario without ECC, any channel code is not applied, resulting in 1024 data bits in one packet with 1024 symbols. On the other hand, in the coded scenario with the aid of ECC, half-rate non-systematic convolutional (NSC) code with Generator polynomials \(G_0(x) = 1 + x + x^2 + x^3\) and \(G_1(x) = 1 + x^2 + x^3\) is utilized. The code length is 1024 coded bits, i.e., the information length is 509 bits and the tail length for state termination of the convolutional code is 3 bits. Its decoding employs the MAP algorithm. In the case of IDD, the number of iterations for LLR exchange between the MAP detector and the channel decoder is 16. At this time, we used a random permutation in the interleaver. The channel model assumes the AWGN channel is affected by flat Rayleigh fading. IQ imbalance is assumed to be negligibly small in this paper.
As a comparison with the traditional IBFD, i.e., a baseline scheme, the performance of the ASIC with the aid of CSI is evaluated. \(L=3\) is used for both ASIC and DASIC. Thus, the dominating complexity order of BCJR is the same. When IDD is applied in DASIC, the complexity linearly increases according to the allowed number of iterations.
5.1 Without Phase Noise Impairments
Figure 9 shows the PER characteristics of the DASIC without phase noise impairments for \(|h_\mathrm{AB}|^2 E_\mathrm{s}/N_0\). Although the channel obeys Rayleigh fading, the horizontal axis is the instantaneous \(|h_ \mathrm{AB}|^2 E_\mathrm{s}/N_0\), not the average. As a result, it is equivalent to the channel affected by phase rotation without amplitude fluctuations.
Fig. 9 PER performance without phase noise impairments (\(\zeta=-20\) [dB]): dashed and solid lines are of the ASIC and DASIC, respectively. |
Figure 9(a) presents the detection capability when the channel states and noise variance are ideally estimated. Thus, \(\tilde{h}_\mathrm{AB}\) and \(\beta\) are perfectly known at node A in the DASIC. On the other hand, \(h_\mathrm{AA}\), \(h_\mathrm{AB}\), and \(N_0\) are perfectly captured in the ASIC. Three types of PER are evaluated for each DASIC and ASIC. The first and second types are without and with the channel encoder (“w/o ECC,” “w/ ECC”). The last type of PER is IDD with the aid of LLR exchange between the MAP detector and the decoder. As can be seen in the figure, the ASIC achieves a gain of approximately 2 [dB] compared to the DASIC for all types of PER. However, this comparison is unfair because the ASIC can completely eliminate SI in this case. It is obvious that the DASIC is not useful in the ideal scenario.
Now, let us shift the focus to Figs. 9(b) and (c), which show the PER when the channel and noise variance are estimated by 32- and 16-bit pilot sequences, respectively. Due to the pilot contamination induced by asynchronous IBFD between nodes A and B, a longer pilot is necessary for the ASIC to suppress channel estimation errors enhanced by the non-orthogonal pilot sequences. Figure 9(b) shows the impairments caused by the pilot contamination. Even if the 32-bit pilot is available, the slope of the PER curves of the ASIC is low. As a result, DASIC outperforms ASIC at the lower PER target. Furthermore, when the pilot length is shorter, such as \(M=16\), as shown in Fig. 9(c), we can see that the DASIC has large advantages. The results explicitly demonstrate that the proposed DASIC algorithm is effective for the pilot contamination problem in asynchronous IBFD.
5.2 With Phase Noise Impairments
As discussed in Fig. 5, IBFD seriously suffers from the negative effects of phase noise. Figure 10 visualizes the negative effects of phase noise impairments for the delay \(\tau_\mathrm{A}\) = 1 [nsec] and 16-bit pilot sequence (\(M=16\)). In the case of \(\zeta = -10\) [dB] of Fig. 10(a), the performance of the ASIC and DASIC-“w/o ECC” is degraded compared to that in Fig. 9(c). However, “w/ ECC” and “IDD” of the DASIC achieve almost the same performance. In the case of \(\zeta = -15\) [dB], it is subject to 1 [dB] penalty at PER = \(10^{-3}\) in the DASIC “w/ ECC.” Finally, in the case of \(\zeta = -20\) [dB], it is subject to 2 [dB] penalty at PER = \(10^{-3}\) even in “IDD.” However, there is no PER error floor in the curve. Furthermore, in the other simulation, we have confirmed the \(\mathrm{PER} = 0.1\) is achieved by the DASIC-“IDD” at \(|h_\mathrm{AB}|^2 E_\mathrm{s}/N_0 = 8\) [dB] in the case of \(\zeta = -25\) [dB] in the other simulations. These results explicitly validate the proposed DASIC-IDD algorithm even in the presence of phase noise when SIR is lager than \(\zeta = -20\) [dB], despite the fact that the ASIC is more sensitive to phase noise behavior. The most impressive feature of the DASIC is the fact that asynchronous IBFD is realized.
Fig. 10 PER performance with phase noise impairments (\(\tau_\mathrm{A}=1\) [nsec], \(M=16\)): dashed and solid lines are of the ASIC and DASIC, respectively. |
When the SIR is below \(\zeta=-20\) [dB], the proposed scheme is not so effective in the presence of phase noise effects because it leads to a significant increase in the transmission power to meet the required PER. Unfortunately, it is difficult to realize IBFD using the proposed method alone, which needs to support typical SIRs of \(-90\) to \(-70\) [dB] in short-range communications for wireless IoT. It is assumed that the proposed method will be used in combination with conventional self-interference cancellation techniques with a total of approximately 60 [dB] interference reduction: approximately 20 [dB] attenuation with antenna isolation, and approximately 40 [dB] with the other passive analog canceller. However, the scale of analog circuits required to achieve significant interference suppression with a passive analog canceller is large, making them unsuitable for wireless IoT applications. To address this problem, it is necessary to consider implementing the proposed method with a technique to suppress the effects of phase noise.
6. Conclusion
In this paper, we proposed a novel DASIC algorithm for asynchronous IBFD GFSK, which is designed for wireless IoT. The DASIC incorporates the principle of the differential codec. Because of the differential structure, the DASIC can suppress SI without the CSI estimation of SI. To improve the detection capability, IDD for the DASIC was appropriately investigated.
In ideal channel estimation conditions, the DASIC has the disadvantage of decreasing the reception sensitivity compared to the ASIC. However, when the CSI contains estimation errors induced by pilot contamination, the detection capability of the DASIC is better than that of the ASIC. Furthermore, with the aid of IDD, the SIR tolerance is improved to approximately 20 [dB] for maintaining PER = \(10^{-3}\). Although the utilization field is limited to indoor environments, the results explicitly demonstrate the possibility of the realization of asynchronous IBFD in combination with conventional antenna isolation and analog SI cancellation techniques. The asynchronous blind SI cancellation will open new vistas in the utilization of IBFD in wireless IoT. As a future work, practical implementation of analog DASIC circuit is an attractive issue.
Acknowledgments
A part of this work was financially supported by JSPS KAKENHI Grant Number JP21H01332 and grants-in-aid from the Haris Science Research Institute of Doshisha University.
References
[1] K. Chang, “Bluetooth: A viable solution for IoT?,” IEEE Wireless Commun., vol.21, no.6, pp.6-7, Dec. 2014.
CrossRef
[2] M.R. Palattella, M. Dohler, A. Grieco, G. Rizzo, J. Torsner, T. Engel, and L. Ladid, “Internet of Things in the 5G era: Enablers, architecture, and business models,” IEEE J. Sel. Areas Commun., vol.34, no.3, pp.510-527, March 2016.
CrossRef
[3] K. Hirade, M. Ishizuka, F. Adachi, and K. Ohtani, “Error-rate performance of digital FM with differential detection in land mobile radio channels,” IEEE Trans. Veh. Technol., vol.28, no.3, pp.204-212, Aug. 1979.
CrossRef
[4] B.E. Rimoldi, “A decomposition approach to CPM,” IEEE Trans. Inf. Theory, vol.34, no.2, pp.260-270, March 1988.
CrossRef
[5] D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” Proc. ACM SIGCOMM 2013, pp.375-386, Aug. 2013.
CrossRef
[6] Z. Zhang, K. Long, A.V. Vasilakos, and L. Hanzo, “Full-duplex wireless communications: Challenges, solutions, and future research directions,” Proc. IEEE, vol.104, no.7, pp.1369-1409, July 2016.
CrossRef
[7] K.E. Kolodziej, B.T. Perry, and J.S. Herd, “In-band full-duplex technology: Techniques and systems survey,” IEEE Trans. Microw. Theory Techn., vol.67, no.7, pp.3025-3041, July 2019.
CrossRef
[8] A. Gupta and R.K. Jha, “A survey of 5G network: Architecture and emerging technologies,” IEEE Access, vol.3, pp.1206-1232, 2015.
CrossRef
[9] Z. Zhang, X. Chai, K. Long, A.V. Vasilakos, and L. Hanzo, “Full duplex techniques for 5G networks: Self-interference cancellation, protocol design, and relay selection,” IEEE Commun. Mag., vol.53, no.5, pp.128-137, May 2015.
CrossRef
[10] V. Wong, Key Technologies for 5G Wireless Systems, Cambridge University Press, 2017.
CrossRef
[11] M. Duarte, C. Dick, and A. Sabharwal, “Experiment-driven characterization of full-duplex wireless systems,” IEEE Trans. Wireless Commun., vol.11, no.12, pp.4296-4307, Dec. 2012.
CrossRef
[12] A. Sahai, G. Patel, C. Dick, and A. Sabharwal, “On the impact of phase noise on active cancelation in wireless full-duplex,” IEEE Trans. Veh. Technol., vol.62, no.9, pp.4494-4510, Nov. 2013.
CrossRef
[13] E. Everett, A. Sahai, and A. Sabharwal, “Passive self-interference suppression for full-duplex infrastructure nodes,” IEEE Trans. Wireless Commun., vol.13, no.2, pp.680-694, Feb. 2014.
CrossRef
[14] B.P. Day, A.R. Margetts, D.W. Bliss, and P. Schniter, “Full-duplex MIMO relaying: Achievable rates under limited dynamic range,” IEEE J. Sel. Areas Commun., vol.30, no.8, pp.1541-1553, Sept. 2012.
CrossRef
[15] P. Popovski and H. Yomo, “Physical network coding in two-way wireless relay channels,” Proc. IEEE ICC 2007, pp.707-712, June 2007.
CrossRef
[16] Z. Zhang, Z. Ma, Z. Ding, M. Xiao, and G.K. Karagiannidis, “Full-duplex two-way and one-way relaying: Average rate, outage probability, and tradeoffs,” IEEE Trans. Wireless Commun., vol.15, no.6, pp.3920-3933, June 2016.
CrossRef
[17] Y. Choi and H. Shirani-Mehr, “Simultaneous transmission and reception: Algorithm, design and system level performance,” IEEE Trans. Wireless Commun., vol.12, no.12, pp.5992-6010, Dec. 2013.
CrossRef
[18] D. Korpi, T. Riihonen, V. Syrjälä, L. Anttila, M. Valkama, and R. Wichman, “Full-duplex transceiver system calculations: Analysis of ADC and linearity challenges,” IEEE Trans. Wireless Commun., vol.13, no.7, pp.3821-3836, July 2014.
CrossRef
[19] A. Tang and X. Wang, “A-duplex: Medium access control for efficient coexistence between full-duplex and half-duplex communications,” IEEE Trans. Wireless Commun., vol.14, no.10, pp.5871-5885, Oct. 2015.
CrossRef
[20] A. Sabharwal, P. Schniter, D. Guo, D.W. Bliss, S. Rangarajan, and R. Wichman, “In-band full-duplex wireless: Challenges and opportunities,” IEEE J. Sel. Areas Commun., vol.32, no.9, pp.1637-1652, Sept. 2014.
CrossRef
[21] D. Kim, H. Lee, and D. Hong, “A survey of in-band full-duplex transmission: From the perspective of PHY and MAC layers,” IEEE Commun. Surveys Tuts., vol.17, no.4, pp.2017-2046, Fourth quarter 2015.
CrossRef
[22] M. Kobayashi, R. Murakami, K. Kizaki, S. Saruwatari, and T. Watanabe, “Wireless full-duplex medium access control for enhancing energy efficiency,” IEEE Trans. Green Commun. Networking, vol.2, no.1, pp.205-221, March 2018.
CrossRef
[23] K. Komatsu, Y. Miyaji, and H. Uehara, “Basis function selection of frequency-domain Hammerstein self-interference canceller for in-band full-duplex wireless communications,” IEEE Trans. Wireless Commun., vol.17, no.6, pp.3768-3780, June 2018.
CrossRef
[24] G. Qiao, S. Gan, S. Liu, L. Ma, and Z. Sun, “Digital self-interference cancellation for asynchronous in-band full-duplex underwater acoustic communication,” Sensors, vol.18, no.6, 1700, May 2018.
CrossRef
[25] J. Choi, D. Kim, S. Lee, H. Lee, J. Bang, and D. Hong, “A new frame structure for asynchronous in-band full-duplex systems,” Proc. IEEE PIMRC 2015, pp.487-491, 2015.
CrossRef
[26] A. Munari, P. Mähönen, and M. Petrova, “A stochastic geometry approach to asynchronous aloha full-duplex networks,” IEEE/ACM Trans. Netw., vol.25, no.6, pp.3695-3708, 2017.
CrossRef
[27] V. Towhidlou and M. Shikh-Bahaei, “Adaptive full-duplex communications in cognitive radio networks,” IEEE Trans. Veh. Technol., vol.67, no.9, pp.8386-8395, 2018.
CrossRef
[28] L. Hanzo, T. Liew, and B. Yeap, Turbo Coding, Turbo Equalisation and Space-Time Coding, Wiley, New York, 2002.
CrossRef
[29] D. MacKay, Information Theory, Inference and Learning Algorithms, Cambridge University Press, 2003.
[30] J. Hagenauer, E. Offer, and L. Papke, “Iterative decoding of binary block and convolutional codes,” IEEE Trans. Inf. Theory, vol.42, no.2, pp.429-445, March 1996.
CrossRef
[31] M. Tuchler and A.C. Singer, “Turbo equalization: An overview,” IEEE Trans. Inf. Theory, vol.57, no.2, pp.920-952, Feb. 2011.
CrossRef
[32] S. Ibi, T. Matsumoto, R. Thoma, S. Sampei, and N. Morinaga, “EXIT chart-aided adaptive coding for multilevel BICM with turbo equalization in frequency-selective MIMO channels,” IEEE Trans. Veh. Technol., vol.56, no.6, pp.3757-3769, Nov. 2007.
CrossRef
[33] T. Takahashi, S. Ibi, and S. Sampei, “Design of adaptively scaled belief in multi-dimensional signal detection for higher-order modulation,” IEEE Trans. Commun., vol.67, no.3, pp.1986-2001, March 2019.
CrossRef
[34] M. Elsayed, A.A.A. El-Banna, O.A. Dobre, W. Shiu, and P. Wang, “Low complexity neural network structures for self-interference cancellation in full-duplex radio,” IEEE Commun. Lett., vol.25, no.1, pp.181-185, 2021.
CrossRef
[35] Z. Wang, M. Ma, and F. Qin, “Neural-network-based nonlinear self-interference cancelation scheme for mobile stations with dual-connectivity,” IEEE Access, vol.9, pp.53566-53575, 2021.
CrossRef
[36] A. Balatsoukas-Stimming and C. Studer, “Deep unfolding for communications systems: A survey and some new directions,” Proc. IEEE SiPS 2019, pp.266-271, 2019.
CrossRef
[37] D. Shirase, T. Takahashi, S. Ibi, K. Muraoka, N. Ishii, and S. Sampei, “Deep unfolding-aided gaussian belief propagation for correlated large mimo detection,” Proc. GLOBECOM 2020, pp.1-6, 2020.
CrossRef
[38] J.B. Anderson, T. Aulin, and C.E. Sundberg, Digital Phase Modulation, 1st ed., Springer Publishing Company, 2013.
CrossRef
Footnotes
1. The signal detection of node A’s message at node B is readily explained by replacing the variables.
2. If the analog circuitry of the DASIC is difficult to implement from the cost perspective, Fig. 2 can be implemented in the digital domain as an alternative. In this case, the ADC shown in Fig. 1 is placed in front of the DASIC and can operate at the same sampling rate as the symbol rate of the MAP detector.
3. Although this paper assumes the identical GFSK modulation in nodes A and B, the same DASIC technique can be used for SI cancellation when changing to other modulation schemes. However, note that changes in the combination of modulation schemes complicate the trellis structure, which causes changes in the error correction effect in the MAP signal detector, as well as in the iterative gain for the IDD regime.