Next Article in Journal
Ontology-Based Domain Analysis for Model Driven Pervasive Game Development
Previous Article in Journal
Towards Aiding Decision-Making in Social Networks by Using Sentiment and Stress Combined Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Worst Case Performance Analysis of Approximated Zero Forcing Vectoring for DSL Systems

by
Franco Mazzenga
1,† and
Romeo Giuliano
2,*,†
1
Department of Enterprise Engineering “Mario Lucertini”, University of Rome Tor Vergata, Via del Politecnico 1, 00133 Rome, Italy
2
Department of Innovation & Information Engineering, Guglielmo Marconi University, Via Plinio 44, 00193 Rome, Italy
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Information 2018, 9(5), 108; https://doi.org/10.3390/info9050108
Submission received: 9 March 2018 / Revised: 27 April 2018 / Accepted: 28 April 2018 / Published: 3 May 2018

Abstract

:
In this paper we introduce a Gaussian approximation for the achievable downstream bit rate per user in modern broadband and ultra-broadband digital subscriber loop-based access systems. The considered formulation allows one to account for the main characteristics of the interference scenario (e.g., number and positions of interferers along the cable), the far-end crosstalk (FEXT) fluctuations, bit loading limitation per sub-carrier, and approximated zero forcing in vectoring pre-coding. Formulas are obtained assuming log-normal statistics for the signal-to-interference plus noise ratio per sub-carrier. The validity of the considered approximation has been assessed by computer calculation. A very good agreement between the exact and the approximated bit rates is obtained. The bit rate approximation is then used to analyze the performance of a very high-speed digital subscriber line type 2 (VDSL2, Profile 35b) with vectoring and used to assess G.fast performance degradation when approximated zero forcing in vectoring pre-coding is applied. It is observed for G.fast performance that degradation due to residual FEXT after vectoring pre-coding can be relevant. A significant performance improvement can be achieved at the expense of increased computational complexity of the vectoring pre-coding.

1. Introduction

Modern digital subscriber loop (DSL) technologies, such as the very high-speed digital subscriber line type 2 (VDSL2, ITU-T G.993.2) in the fiber-to-the-cabinet (FttC) architecture and G.fast (ITU-T G9701) in the fiber-to-the-distribution point (FttDp) architecture, are adopted by telecommunication operators to provide ultra-broadband services to their subscribers. For preliminary performance analysis of FttC/FttDp access networks in terms of the achievable bit rate per user, simulation tools are adopted. However, due to the large number of variables, parameters, and constraints, simulation-based approaches for preliminary planning can be time consuming due to the very large number of possibilities to be explored. To avoid this inconvenience, analytical bit rate models or semi-analytical approaches can be helpful to reduce calculation time and to speed up preliminary planning. The main goal of this paper is to provide an analytical framework allowing one to rapidly assess bit rate performance for the considered ultra-broadband DSL technologies. The proposed formulation allows one to easily account for the access network geometry, for far-end crosstalk (FEXT) random dispersion, and for vectoring pre-coding, by incorporating models and techniques widely accepted in the current literature and in practice. We consider the co-located users scenario which allows one to assess achievable performance in the worst case interference situation for downstream (DS) transmissions. This scenario is simple to reproduce in the laboratory and it is commonly considered by telecommunication operators to be the base of their commercial offers.
Concerning FEXT characterization, several models (mostly based on experimental data) have been proposed by International Telecommunication Union (ITU) [1] and other organizations/institutions [2].
In current practice, the overall FEXT model is obtained by multiplying the 1 % worst-case model including FEXT dispersion [3] by the selectivity term at sub-carrier frequency f k [4,5]. FEXT is the main limiting factor of performance for VDSL as well as for G.fast. Vectoring techniques, originally proposed in Reference [6], are commonly adopted to mitigate or cancel FEXT and to improve performance on DS transmissions by means of pre-coding and by interference cancellation at the digital subscriber line access multiplexer (DSLAM) on upstream (US) signals.
Concerning DS transmissions, several pre-coding algorithms have been proposed over the years. Zero forcing (ZF) algorithms based on channel matrix inversion are presented in References [7,8] and their performance limits are investigated in References [9,10]. In Reference [11], the authors propose an alternative pre-coding technique based on the concept of least favourable noise. However, this algorithm is not ideally suited for practical implementation because of its computational complexity and large feedback overhead. A low complexity implementation of the generalized decision feedback (GDFE) technique of Reference [11] is presented in Reference [12]. All the proposed techniques require the calculation of the channel matrix inverse as well as the evaluation of QR decomposition (QRD) and singular value decomposition (SVD). Due to high computational complexity of these operations, their implementation in modern VDSL2 and G.fast systems could require high costs and power hungry vectoring processors in the DSLAM to implement the pre-coding algorithms.
The approximated zero forcing pre-coding technique (AZF) in Reference [7] is based on successive approximations of the channel matrix inverse. The AZF approach has been shown (Reference [13], Appendix III) as a viable, low cost, and effective practical implementation for vectoring pre-coding. The AZF doesn’t allow complete FEXT cancelation from the received observables i.e., a residual FEXT term still limits performance. However, the AZF algorithm does not require the calculation of the channel matrix inverse, thus saving significant computational power especially when a large number of copper lines (e.g., up to 200) are processed. The AZF performance can be improved by successively refining the pre-coding matrix at the expense of an increased computational complexity. The effectiveness of the AZF technique has been analyzed in References [7,10] in terms of upper and lower bounds of the signal-to-interference plus noise per sub-carrier ratio and in terms of the achievable bit rate per user. However, in these analyses no random fluctuations of FEXT statistics have been considered and results are restricted to simple scenarios (e.g., from 4–28 VDSL lines in the 0–17 MHz band [10]).
Results on AZF performance are also presented in the current literature. In Reference [14], performance results are obtained using a simulation approach without providing any theoretical results on the statistics of the residual FEXT. Authors in Reference [15] present a spectrum optimization algorithm for both zero-forcing and minimum mean squared error (MMSE) pre-coding methods. Performance of both techniques are compared for G.fast showing MMSE outperforms AZF. Finally, in Reference [9], the authors provide a lower bound on the achievable DS bit rate which is based on a calculation of the achievable bit rate for the worst-case user. This differs from our paper in that no discussion or stochastic characterization of the residual FEXT is provided.
The stochastic framework presented in this paper permits performance analysis of the AZF pre-coding techniques in the co-located users case. In detail, the main contributions of this paper are summarized in the following points:
  • The stochastic bit rate formulation in Reference [16] is extended to include vectoring. It is shown that a log-normal approximation of the signal-to-interference plus noise ratio (SINR) per sub-carrier is still valid in the case of vectoring, allowing one to derive the corresponding Gaussian characterization of the DS bit rate. For typical implementation of AZF pre-coding, the mean and the standard deviation of the bit rate are expressed in an analytical closed form. The Gaussian bit rate approximation can also be used to obtain the user bit rate even in the case of a bit-loading limitation per sub-carrier. The validity of the Gaussian bit rate approximation including vectoring is assessed by computer calculation. Very good agreement with the bit rate values obtained from the exact calculation are achieved for the considered access network topology and FEXT statistics.
  • We provide the analytical closed form expressions for the statistics, e.g., the mean and the quadratic mean of the residual FEXT for the AZF implementation suggested in Reference [13]. These expressions explicitly account for the position of users in the access network and for statistics of the random variables modeling FEXT fluctuations.
  • We provide analytical closed form expressions for the mean and the quadratic mean of the residual FEXT in the case of co-located interferers for first and second order AZF pre-coding. These results are used to assess the effectiveness of second order pre-coding for improving bit rate performance in VDSL2 and G.fast. In particular, it is shown that second order pre-coding allows one to obtain a bit rate loss (evaluated with respect to the ideal case) of few percent for VDSL2 and of about 10 % for G.fast.
In Reference [17], the authors have introduced a simplified stochastic framework for assessing the VDSL2 DS bit rate in the presence of vectoring. However, their results do not refer to any specific implementation of the DS pre-coding vectoring algorithm and vectoring effects are accounted for by a constant multiplicative factor (less than one) in front of the FEXT power [17]. Instead, in our work the residual FEXT term obtained after vectoring is characterized in terms of a log-normal approximation and its corresponding moments.
The paper is organized as follows. In Section 2 we describe the typical access network architecture for VDSL2/G.fast and we define the characteristics of the considered scenario. The AZF pre-coding is detailed in Section 3. The general characterization of FEXT and of residual FEXT is presented in Section 4. In Section 5 we introduce log-normal approximations for FEXT and residual FEXT in the first and second order AZF and we provide closed form expressions for their mean and quadratic mean, which are valid in the co-located users case. Starting from the log-normal (residual) FEXT approximation, the Gaussian bit rate approximation is derived in Section 6. The validity of the considered Gaussian bit rate model in the case of vectoring is assessed by computer calculation in Section 7. The proposed formulation is then applied to assess bit rate performance of VDSL2 and G.fast in Section 8. Finally, conclusions are drawn.

2. Access Scenario

The typical geometry of an FttC (or FttDp) access network is depicted in Figure 1.
Interferers in the buildings are connected to the cabinet or to the distribution point (Dp) by pairs using the same copper cable. The copper pairs assigned to users can lie in the same or in other binders in the same cable. The typical number of copper pairs in each binder varies from 25 up to 50; the cable from cabinet or from the Dp typically contains four or eight binders and the overall number of pairs in the cable typically varies from 100 to 200, and up to 400. The m-th building is at a distance L m from the cabinet or Dp. In general, users in the same building can be randomly located over the floors. In the following we assume users are co-located i.e., they are at the same distance from the cabinet/Dp. This refers to the worst case crosstalk condition since the coupling lengths among users take their maximum values equal to the distance from the cabinet. This scenario is very important for two reasons. It is simple to emulate for laboratory tests and bit rate performance obtained in this case provides a lower bound on the achievable bit rate in realistic conditions where users are distributed among the buildings. Bit rate performance in the co-located case are commonly used by telecommunication operators to define their commercial offers.

3. Vectoring Pre-Coding

The vector of observables r k at the output of the N receivers at sub-carrier frequency f k is:
r k = H k b k + n k ,
where b k is the N × 1 vector of symbols transmitted by the N users on the sub-carrier frequency f k and n k is the N × 1 vector accounting for background noise at each receiver. Symbols b i , k , i = 1 , , N are assumed to be zero mean and identically distributed with the same power P k . The N × N matrix H k is the channel matrix at sub-carrier frequency f k . The main diagonal terms of H k account for direct propagation, i.e., h i i ( k ) = H D , k ( d i ) , where d i is the distance of the reference user from the Cabinet.
The off-diagonal terms account for FEXT, i.e., h i j ( k ) = H F , k ( d i , l i j ) for i j with:
H F , k ( d i , l i j ) = χ F l i j f k 10 X i j / 20 10 ι ϕ i j g i j ( f k ) H D , k ( d i ) ,
where g i j ( f k ) is the frequency selectivity term of the FEXT transfer function accounting for random fluctuations with respect to the average FEXT level, i.e., χ F l i j f k 10 X i j / 20 at frequency f k . We assume g i j ( f k ) are identically distributed and statistically independent (i.i.d.) over i and j and for each k; they have zero mean and unit variance. Additionally, ϕ i j is a random phase term independent of k and uniformly distributed in [ 0 , 2 π ) ; l i j is the coupling length between the i-th and j-th active users; and χ F is the FEXT coupling coefficient. For a given reference distance d i , the coupling lengths l i j can be easily obtained from the access network geometry such as that depicted in Figure 1. In the co-located case, we assume l i j = d i for each j = 1 , 2 , , N with j i .
X i j (in dB) are random variables accounting for FEXT fluctuation with respect to the 1 % FEXT condition [3]. Here, X i j are assumed to be Gaussian (in dB), with mean μ d B and standard deviation σ d B , and are assumed to be independent of the distance from the cabinet/Dp and of the sub-carrier frequency. Furthermore, we consider the { X i j } do not vary with frequency and are i.i.d. A discussion on the validity of the log-normal assumption even when X i j are considered to be Beta distributed [2] has been presented in Reference [18]. In the following we consider random variables e y i j in place of 10 X i j / 20 i.e., :
y i j = X i j ln ( 10 ) / 20 = μ + σ ν i j ,
with μ = μ d B ln ( 10 ) / 20 , σ = σ d B ln ( 10 ) / 20 , and ν i j is a zero mean Gaussian random variable with unit variance. From now on, the index i will refer to a (generic) reference user.
The channel matrix H k in Equation (1) can be conveniently re-written as:
H k = D k I + C k ,
where I is the identity matrix, D k is a diagonal matrix containing the direct propagation terms; the matrix C k has zeros along the main diagonal and contains the FEXT terms normalized by row for the corresponding direct propagation term i.e., c i j ( k ) = H F , k ( i , j ) ( d i , l i j ) / H D , k ( d i ) with l i j = d i for all j i . The pre-coding matrix to be applied to the DS symbols approximates the inverse of I + C k . For the considered frequency intervals, we can assume | c i j ( k ) | 1 (i.e., diagonal dominance assumption) in C k . Thus, a good approximation of the inverse of I + C k is:
L k ( p ) = I + m = 1 p ( 1 ) m C k m ,
and p 1 is referred as the order of the pre-coding matrix. Let L k ( p ) b k be the vector of pre-coded symbols, assuming an exact estimate of C k , the vector of the received observables on the k-th sub-carrier is:
r k ( p ) = D k I C k p + 1 b k + n k .
When p = 0 no vectoring pre-coding is applied and L k ( 0 ) = I .
The C k p + 1 term in Equation (6) is responsible for residual FEXT in the received observables. In the following Sections we derive a stochastic characterization of residual FEXT power for p = 1 , while for p = 2 we derive the first two moments of the residual FEXT power in the co-located users case i.e., all receivers are placed at the same distance d from the cabinet. For given FEXT fluctuations and allocated transmitted power per sub-carrier, co-location of interferers corresponds to the worst case interference scenario for the reference user at distance d from the cabinet, since all coupling lengths assume their maximum values. This assumption allows one to obtain a lower bound on the achievable performance in the case of AZF vectoring pre-coding.

4. FEXT Characterization and SINR Calculation

Let c i j ( k , p ) ( d i ) be the ( i , j ) element of C k p + 1 . The residual FEXT term in the i-th received observable r i , k is:
x F , i , k ( p ) ( d i ) = H D , k ( d i ) j = 1 N c i j ( k , p ) b j , k ( 1 δ i j ) ,
and δ i j is the Kronecker symbol. The residual FEXT power is obtained from Equation (7) by first averaging the square modulus of Equation (7) with respect to transmitted symbols { b i , k } for i = 1 , , N , and then averaging with respect to the FEXT frequency selective g i j ( f k ) and phase terms ϕ i j in Equation (2), thus obtaining:
I F , i , k ( p ) ( d i ) = | H D , k ( d i ) | 2 j = 1 N E c i j ( k , p ) 2 P k · ( 1 δ i j ) .
The expectation E { · } in Equation (8) is evaluated with respect to the selective FEXT and phase terms.
As shown in the following, performance can be expressed in terms of the S I N R k , p ( i ) ( d i ) which is the SINR on the k-th sub-carrier at frequency f k for the (generic) i-th reference user at distance d i from the cabinet/Dp. When considering AZF vectoring pre-coding of order p, the S I N R k , p ( i ) ( d i ) can be written as:
S I N R k , p ( i ) ( d i ) = | H D , k ( d i ) | 2 E 1 c i i ( k , p ) 2 P k η k + I F , i , k ( p ) ( d i ) ,
where η k is the background noise power; and P k is the power transmitted on the k-th sub-carrier. In the co-located scenario, we assume P k = P are the same for DS users transmitting from the same cabinet. This avoids the harmful FEXT of high power users on low power ones in the non-vectoring case. In the case of vectoring, the power of transmitted symbols can be increased/decreased with respect to P in accordance with the resulting pre-coding matrix. Under the diagonal dominance assumption, which is valid for the considered frequency range (i.e., up to 100 MHz), we can assume | c i i ( k , p ) | 1 and hence it can be neglected in Equation (9) for VDSL2.
For a given distance of users from the cabinet/Dp and a given FEXT situation described by the random variables y i j in Equation (3), it is not difficult to observe that the residual FEXT in Equation (8) is given by the sum of (correlated) log-normal random variables for any p. Then, following the approach of Reference [16], the S I N R k , p ( i ) ( d i ) in Equation (9), for the non-vectoring case (i.e., p = 0 ) as well as for vectoring pre-coding of order p, can be approximated as:
S I N R k , p ( i ) ( d i ) D k ( d i ) 1 + v D D k ( d i ) χ F p + 1 f k 2 ( p + 1 ) N p , i d i p + 1 e y ˜ p , i ,
where D k ( d ) = | H D , k ( d ) | 2 P / η k is the signal-to-background noise ratio in the no FEXT case. From Equation (10) we have implicitly assumed that the FEXT in the non-vectoring case (i.e., p = 0 ) or the residual FEXT power after pre-coding in Equation (8) can be approximated as:
I F , i , k ( p ) ( d i ) v D χ F p + 1 f k 2 ( p + 1 ) d p + 1 N p , i e y ˜ p , i | H D , k ( d i ) | 2 P ,
where N p , i is a coefficient, e y ˜ p , i is the log-normal sum of random variables approximating the FEXT/residual FEXT term, and y ˜ p , i is a Gaussian variable with mean μ ˜ p , i and standard deviation σ ˜ p , i . Finally, v D is the degradation due to practical implementation of the vectoring pre-coding algorithm and it may account for losses due to an imperfect channel estimate.
In the non-vectoring case i.e., p = 0 , the results of Reference [18] are re-obtained. To render the paper self-contained, some of the results of this reference have been repeated in the Appendix.

5. First and Second Order Statistics of FEXT and of Residual FEXT

In this Section we provide the closed form expression of the first and second order moments of the FEXT in the non-vectoring case, p = 0 , and the residual FEXT in the co-located case for p = 1 , 2 . Results are reported in the following sub-sections.

5.1. Non-Vectoring Case, p = 0

Considering DS transmission, in the non-vectoring case and assuming co-located terminals, following the approach in Reference [16] the FEXT power (after averaging out selective FEXT) is:
I F , i , k ( 0 ) ( d i ) = v D χ F f k 2 d i | H D , k ( d i ) | 2 P j = 1 N e 2 y i j ,
It can be observed that I F , i , k ( 0 ) ( d i ) is the sum of log-normal random variables which can be approximated as log-normal itself [18]. The mean and the quadratic mean of Equation (12) with respect to the log-normal terms are:
E { I F , i , k ( 0 ) ( d i ) } = v D χ F f k 2 d i | H D , k ( d i ) | 2 P e 2 μ + 2 σ 2 ( N 1 ) ,
E { I F , i , k ( 0 ) ( d i ) 2 } = v D 2 χ F 2 f k 4 d i 2 | H D , k ( d i ) | 4 P 2 e 4 μ + 4 σ 2 ( N 1 ) e 4 σ 2 + ( N 2 ) .
This can be used to evaluate N 0 , i and the statistics (mean and standard deviation) of the random variable y ˜ 0 , i of Equation (11) in accordance with the Wilkinson method [19] as follows. The coefficient N 0 , i can be obtained by assuming equality between the mean in Equation (11) (with p = 0 ) and Equation (13), thus obtaining:
N 0 , i E e y ˜ 0 , i = ( N 1 ) e 2 μ + 2 σ 2 .
Here, E { e y ˜ 0 , i } = e μ ˜ 0 , i + σ ˜ 0 , i 2 / 2 is the mean of the log-normal random variable e y ˜ 0 , i ; and μ ˜ 0 , i , and σ ˜ 0 , i are the mean and the standard deviation of y ˜ 0 , i , respectively, which should be evaluated. From Equation (15) we assume E { e y ˜ 0 , i } = e 2 μ + 2 σ 2 so that:
N 0 , i = N 1 .
The second equation required to calculate μ ˜ 0 , i , σ ˜ 0 , i can be obtained by equating the quadratic mean of Equation (11) (with p = 0 ) and the quadratic mean in Equation (14) i.e.,:
N 0 , i 2 E e 2 y ˜ 0 , i = e 4 μ + 4 σ 2 ( N 1 ) e 4 σ 2 + ( N 2 ) ,
and hence:
e 2 μ ˜ 0 , i + 2 σ ˜ 0 , i 2 = e 4 μ + 4 σ 2 N 1 e 4 σ 2 + ( N 2 ) .
The two Equations (15) and (18) can be used to evaluate the moments of y ˜ 0 , i as:
μ ˜ 0 , i = 2 ln A 1 2 ln B , σ ˜ 0 , i = ln B 2 ln A ,
where, A and B are:
A = e 2 μ + 2 σ 2 , B = e 4 μ + 4 σ 2 N 1 e 4 σ 2 + ( N 2 ) .

5.2. Vectoring Pre-Coding: p = 1

The mean and the quadratic mean of the residual FEXT in the p = 1 case can be obtained from Equation (8) and hence we have:
E { I F , i , k ( 2 ) ( d i ) } = v D f k 4 χ F 2 d i 2 | H D , k ( d i ) | 2 P · e 4 ( η + σ 2 ) N 1 N 2 ,
and:
E { I F , i , k ( 2 ) ( d i ) 2 } = v D 2 f k 8 χ F 4 d i 4 | H D , k ( d i ) | 4 P 2 · e 8 ( η + σ 2 ) N 1 N 2 · e 8 σ 2 + ( N 3 ) e 4 σ 2 + ( N 2 ) 2 .
Equations (21) and (22) have been obtained using a symbolic mathematical tool. We have resorted to manual calculations of Equations (21) and (22) for small values of N so to further verify their correctness.
In order to completely characterize the statistics of the approximated expression of the residual FEXT in Equation (11) with p = 1 , we need to derive N 1 , i and μ ˜ 1 , i , σ ˜ 1 , i which are the moments of the random variable y ˜ 1 , i in Equation (11). To this aim we follow the same calculation approach presented in Section 5.1 for the non-vectoring case, thus obtaining:
N 1 = ( N 1 ) ( N 2 ) ,
and μ ˜ 1 , i , σ ˜ 1 , i are obtained using Equation (19) with A and B as:
A = e 4 μ + 4 σ 2 , B = e 8 ( η + σ 2 ) ( N 1 ) ( N 2 ) e 8 σ 2 + ( N 3 ) e 4 σ 2 + ( N 2 ) 2 .

5.3. Vectoring Pre-Coding: p = 2

In the case of vectoring pre-coding with p = 2 , the mean and the quadratic mean of the residual FEXT are:
E { I F , i , k ( 3 ) ( d i ) } = v D f k 6 χ F 3 d i 3 | H D , k ( d i ) | 2 P e 6 ( η + σ 2 ) N 1 · 6 e 4 σ 2 + ( N 2 ) ( N + 1 ) ,
E { I F , i , k ( 3 ) ( d i ) 2 } = v D 2 f k 12 χ F 6 d i 6 | H D , k ( d i ) | 4 P 2 e 12 ( η + σ 2 ) ( N 1 ) · · a 1 e 28 σ 2 + a 2 e 16 σ 2 + a 3 e 12 σ 2 + a 4 e 8 σ 2 + a 5 e 4 σ 2 + a 6 ,
where
a 1 = 36 a 2 = 24 ( N 2 ) a 3 = ( 13 ( N 3 ) + 56 ) ( N 2 ) a 4 = ( N 2 ) ( 44 + ( N 3 ) ( N + 4 ) ) a 5 = ( N 2 ) ( 40 + ( N 3 ) ( 139 + ( N 4 ) ( N + 25 ) ) ) a 6 = ( N 2 ) ( N 3 ) ( 42 + ( N 4 ) ( 63 + ( N 5 ) ( N + 10 ) ) ) .
As in Section 5.1, to completely characterize the statistics of the approximated expression of the residual FEXT in Equation (11) with p = 2 , we need to derive N 2 , i , μ ˜ 2 , i , and σ ˜ 2 , i , where the latter two are the moments of the random variable y ˜ 2 , i appearing in Equation (11). Again following the same calculation approach we obtain:
N 2 , i = N 1 · 6 e 4 σ 2 + ( N 2 ) ( N + 1 ) ,
and μ ˜ 2 , i , and σ ˜ 2 , i are obtained using Equation (19) with A and B as:
A = e 6 μ + 6 σ 2 , B = e 12 ( η + σ 2 ) ( N 1 ) N 2 , i 2 · a 1 e 28 σ 2 + a 2 e 16 σ 2 + a 3 e 12 σ 2 + a 4 e 8 σ 2 + a 5 e 4 σ 2 + a 6 .
The a i are the coefficients given in Equation (27).

6. Bit Rate per User and Its Approximation

The log-normal approximation of FEXT and residual FEXT in Equation (11) can be used to derive a Gaussian approximation of the achievable bit rate per user as shown in this Section.
The performance index used to assess DSL performance is the achievable bit rate for the (generic) i-th user at distance d i from the cabinet,:
R b , p ( i ) ( d i ) = R s k I c B [ ρ k , p ( i ) ( d i ) ] ,
where p is the order of the AZF vectoring pre-coding, I c is the set of sub-carrier indices assigned to DS transmission, R s is the symbol rate, and B [ · ] is the number of bits on the k-th sub-carrier assigned in accordance with the following bit-loading limitation criterion:
B [ x ] = b m a x if x b m a x x if b m i n x < b m a x 0 otherwise
where b m i n and b m a x are the minimum and maximum number of bits, respectively, that can be allocated per sub-carrier. Additionally, ρ k , p ( i ) ( d ) in Equation (30) is:
ρ k , p ( i ) ( d ) = log 2 1 + S I N R k , p ( i ) ( d i ) Γ ,
and Γ is the performance gap [6]. The log-normal approximation in Equation (11) allows one to express the argument of the logarithm in Equation (32) as:
1 + S I N R k , p ( i ) ( d i ) / Γ e z k , i , p ( d ) , k I c
where z k , i , p ( d i ) = μ z k , i , p ( d i ) + σ z k , i , p ( d i ) ( ν ) is Gaussian with mean μ z k , i , p ( d i ) and standard deviation σ z k , i , p ( d i ) .
From Equation (30) and using the result of Equation (33) in the case of no bit-loading limitation per sub-carrier (e.g., theoretically b m a x ), the bit rate per user can be modelled with the following Gaussian random variable [16]:
R b , p ( i ) ( d i , ν ) = R ¯ b , p ( i ) ( d i ) + σ R b , p ( i ) ( d i ) ( ν ) ,
whose mean R ¯ b , p ( i ) ( d i ) and standard deviation σ R b , p ( i ) ( d i ) are:
R ¯ b , p ( i ) ( d i ) = R s log 2 ( e ) k S c μ z k , i , p ( d i ) , σ R b , p ( i ) ( d i ) = R s log 2 ( e ) k S c σ z k , i , p ( d i ) .
In the bit rate formulas, we have shown the dependence of the bit rate on p, d i , and ν . In the bit-loading limitation case the bit rate is given in Equation (30) with:
ρ k , p ( i ) ( d i ) = μ z k , i , p ( d i ) + σ z k , i , p ( d i ) ( ν ) log 2 ( e )
The mean and the standard deviation of the Gaussian random variables z k , i , p ( d i ) can be related to the corresponding moments μ ˜ p , i and σ ˜ p , i of the random variable y ˜ p , i in Equation (11). In Appendix A we derive relations between the moments of z k , i , p ( d i ) those of y ˜ p , i . The Wilkinson approach case [19] has been considered for the derivation.

7. Validity of the Bit Rate Approximation

The effectiveness of the bit rate approximation in Equation (34) for VDSL2 in the non-vectoring case has been discussed in Reference [16] for variable μ d B and/or σ d B . These results are not repeated here. In this Section we assess the validity of the bit rate expression in Equation (34) in the AZF vectoring case. The assessment is carried out in terms of the cumulative distribution function (CDF) of the bit rate under variable FEXT conditions i.e., variable number of active terminals, N, and variable distance d from the cabinet. VDSL2 and G.fast technologies have been considered. The maximum VDSL2 frequency is set to f M = 35.32 MHz and the overall transmission power is set to 14.5 dBm. The VDSL2 gap Γ is 12 dB. For G.fast the maximum frequency is set to f M = 106.1 MHz, the overall transmission power is 4 dBm and the gap is Γ = 10.75 dB. In both cases, VDSL2 and G.fast, a flat transmitter power spectrum is assumed (i.e., no (optimal) bit loading algorithm has been considered). Furthermore, the considered FEXT coupling coefficient is χ F 3.6 × 10 20 [20]. For validation purposes, the exact value of the constant χ F is not important.
In Figure 2 we plot the CDF of the bit rate for AZF vectoring with p = 1 . Results have been obtained for N = 20 and v D = 3 dB. Results in Figure 2 show very good agreement between the exact (solid) and approximated (dots) curves at every distance d and for the considered FEXT statistics. Exact results have been obtained by applying Equations (30) and (32) with the S I N R k , p ( i ) ( d i ) from Equation (9) with p = 1 . Differences between approximated bit rates are on the order of some Mbit/s and are not clearly distinguishable in the Figures. The adoption of vectoring allows for significant improvement of performance. Ideally, performances with vectoring should be independent of the positions of the interferers. However, due to imperfect vectoring cancellation, performance degradations due to residual FEXT still occur. Furthermore, for distances greater than d = 500 m the FEXT contribution is no-longer dominant with respect to the background (BN) noise.
The validity of the proposed bit rate Gaussian model is further confirmed by looking at the results in Figure 3, which reports the CDFs of the exact and approximate bit rate for AZF vectoring with p = 1 for variable N and for a given distance of the reference user d = 200 m from the cabinet.
Even in this case, exact and approximated CDFs are practically superimposed in all cases. Nevertheless, for very low FEXT conditions (e.g., N = 5 ), approximated results differ from exact ones for high percentiles in the vectoring case i.e., the model overestimates the achievable performance. Even then, the differences are on the order of several Mbit/s and then can be considered negligible. Residual FEXT increases with N thus degrading performance.
We have repeated the calculations of the exact and approximated bit rates in the G.fast case. Results of the CDFs of the bit rate are reported in Figure 4 and Figure 5 for G.fast starting frequency of 2.2 MHz. Results are provided for the non-vectored ( p = 0 ) and vectored ( p = 1 ) cases.
Considerations similar to those expressed in the VDSL2 case apply. As expected, vectoring is mandatory for G.fast to avoid the severe performance degradation shown in Figure 4.

8. Results

The approximated Gaussian bit rate formulation is now applied to assess the performance of VDSL2 and G.fast with AZF vectoring in the co-located scenario.

8.1. VDSL2 Performance Analysis

In Figure 6, we report the mean of the bit rate per user as a function of the distance from the cabinet for variable N with and without vectoring. In order to show the degradation due to residual FEXT with respect to the ideal case (i.e., background noise only), in the same figure we have plotted the maximum achievable bit rate curve obtained in the ideal case.
Due to the presence of residual FEXT, performance rapidly degrades with N. The residual FEXT becomes negligible with respect to background noise for distances greater than 500 m.
In Figure 7, we report the maximum distance vs. the number of users that can be supported for an assigned target bit rate. Results have been obtained considering the bit rate curves corresponding to the 5-th percentile. Results in Figure 7 can be related to the coverage provided by the VDSL2. In the same figure, the horizontal dotted lines indicate the maximum distance a single user can be served at the target bit rate in the ideal case. These curves show the coverage degradation due to residual FEXT. As an example, for target bit rate R b T = 250 Mbit/s, in the ideal case users up to 330 m can be served at R b T . However, in the presence of residual FEXT, only 12 users at a maximum distance of 250 m can be served at R b T .
Detrimental effects of residual FEXT can be reduced by increasing the order of the pre-coding matrix. This is obtained in the AZF case by passing from p = 1 to p = 2 , or to p > 2 . In Figure 8, we plot the achievable bit rate performance in the considered interference scenario including vectoring with p = 1 and p = 2 .
As shown in Figure 8, the introduction of the quadratic term in the pre-coding matrix (e.g., p = 2 ) allows one to significantly improve the achievable bit rate which becomes closer to the ideal case both in terms of its mean and its 5-th percentile. This fact can be better appreciated looking at the results in Figure 9, where we plot the bit rate loss (percentage) as a function of the distance of the user from the cabinet. The bit rate loss is defined as the difference between the ideal bit rate and the bit rate obtained with vectoring, normalized with respect to the ideal bit rate at the same distance.
Passing from p = 1 to p = 2 performance improves up to 4 or 5 times. As an example, at distance d = 200 m, bit rate loss is reduced from 30 % to about 8 % (5-th percentile). This improvement is achieved at the expense of increased complexity and computational power required for the vectoring processors and to an increase in the corresponding costs and power consumption.

8.2. G.fast Performance Analysis

In this Section we report the DS performance of G.fast under variable interference scenarios. In Figure 10, we plot the user bit rate as a function of distance from the distribution point by varying G.fast starting transmission frequency f S , which is selected in order to guarantee G.fast coexistence with other DSL technologies. Results have been presented for N = 20 and v D = 3 dB with and without vectoring.
As expected, due to FEXT increase with frequency, vectoring is mandatory for G.fast. The increase of starting frequency, from 2.2 MHz to 17.664 MHz and 35.32 MHz, leads to severe performance reduction. This may raise serious concerns for telecommunications operators looking to adopt G.fast, especially when f S = 35.32 MHz. Furthermore, the performance reduction due to residual FEXT in the p = 1 vectoring case is significant. This fact is shown in Figure 11, where we plot the mean and 5-th percentile of the bit rate as a function of the user’s distance from the Dp.
Even in this case, vectoring performance against residual FEXT can be improved by passing from p = 1 to p = 2 . This fact is shown by the results in Figure 12 reporting the bit rate loss as a function of the distance from the Dp.
Passing from p = 1 to p = 2 allows one to reduce the bit rate loss from 30 % to less than 10 % at distances between 50 m and 100 m. To further reduce bit rate loss the possibility of adopting p = 3 (not discussed here) should be considered at the expense of a significant increase in complexity and required computational power of the vectoring pre-coding processors.

9. Conclusions

Starting from a log-normal approximation of the SINR per sub-carrier, we have extended the approximated Gaussian representation for the user bit rate in Reference [16] to include the AZF vectoring algorithm. The effectiveness of the proposed formulations has been tested by computer calculation for variable FEXT conditions and co-located users scenario. Very good agreement between approximated and exact results have been obtained. The approximation has been used to evaluate the achievable performance for VDSL2 and G.fast showing the impact of residual FEXT on the achievable performance. It is shown that passing from p = 1 to p = 2 allows one to obtain performance closer to the ideal case in VDSL2, while for G.fast the p = 2 case should be considered mandatory and p > 2 could further improve performance.

Author Contributions

Authors contribute equally to this paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Calculation of Log-Normal Approximation

In this Appendix, we derive the moments of the random variable z k , i , p ( d i ) in terms of the moments of y ˜ p , i in a closed analytical form by using the Wilkinson approach [19]. We observe Equation (33) can be conveniently written as:
e z k , i , p ( d i ) 1 + e w k , i , p ( d ) ,
and the random variable w k , i , p ( d ) is Gaussian with mean μ w k , i , p ( d ) and standard deviation σ w k , i , p ( d ) . The u k , i , p = μ u k , i , p + σ u k , i , p ν is the generic Gaussian random variable approximating the sum in the denominator of Equation (10).
The moments of the Gaussian random variables { u k , i , p } , { w k , i , p } and { z k , i , p } can be obtained by applying any one of the methods in References [19,21]. Proper selection of the method should be based on the value of the standard deviation σ ˜ p , i . As shown in the following, for p = 2 the Fenton–Wilkinson (FW) method can be successfully applied. For p = 3 , the method in Reference [21] is more accurate.
When applying the FW method recursively, we obtain the following formulas. For notational simplicity, we have omitted the dependence on i, p, and d i leaving only the dependence on the sub-carrier index k. Starting from the moments of z k , i we have:
σ z k 2 = ln 1 + e 2 μ w k + σ w k 2 e σ w k 2 1 1 + e μ w k + 1 2 σ w k 2 2 ,
μ z k = ln 1 + e μ w k + 1 2 σ w k 2 1 2 σ z k 2 ,
where μ w k = μ u k ln Γ + ln D k ( d ) . Additionally σ w k = σ u k with:
σ u k 2 = ln 1 + e 2 μ k + σ k 2 e σ k 2 1 1 + e μ k + 1 2 σ k 2 2 ,
μ u k = ln 1 + e μ k + 1 2 σ k 2 1 2 σ u k 2 .
Finally, μ k = ln v D D k ( d ) χ F p + 1 N p , i d i p + 1 f k 2 ( p + 1 ) + μ ˜ p , i and σ k = σ ˜ p , i for kIc To overcome the limitations of Wilkinson’s approach, other methods to evaluate the log-normal parameters can be considered [21]. However, in some cases it may be not possible to obtain closed form expressions for the parameters of the log-normal random variable which approximates the sum.

References

  1. ITU-T Recommendation G.996.1 Test Procedures for Digital Subscriber Line (DSL) Transceivers. 2006. Available online: https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=G.996.1 (accessed on 2 April 2018).
  2. Alliance for Telecommunications Industry Solutions. ATIS Multiple Input Multiple Output Crosstalk Channel model. In ATIS Technical Report NIPP-NAI-2009-014R3; Alliance for Telecommunications Industry Solutions: Washington, DC, USA, 2009. [Google Scholar]
  3. Sorbara, M.; Duvaut, P.; Shmulyian, F.; Singh, S.; Mahadevan, A. Construction of a DSL-MIMO Channel Model for Evaluation of FEXT Cancellation Systems in VDSL2. In Proceedings of the IEEE Sarnoff Symposium, Nassau Inn, Princeton, NJ, USA, 30 April–2 May 2007; pp. 1–6. [Google Scholar]
  4. Xu, W.; Schroeder, C.; Hoeher, P.A. A Stochastic MIMO Model for Far-End Crosstalk in VDSL Cable Binders. In Proceedings of the IEEE International Conference on Communications (ICC), Dresden, Germany, 14–18 June 2009; pp. 1–6. [Google Scholar]
  5. Cioffi, J.M.; Fang, J.L.; Ginis, G. MIMO Model for Copper Cable: Quantitative Analysis of Matching to Measured Data. IEEE 802.3 Ethernet in the First Mile Task Force. 2002. Available online: http://www.ieee802.org/3/efm/public/mar02/fang_1_0302.pdf (accessed on 2 April 2018).
  6. Ginis, G.; Cioffi, J.M. Vectored transmission for digital subscriber line systems. IEEE J. Sel. Areas Commun. 2002, 5, 1085–1104. [Google Scholar] [CrossRef]
  7. Leshem, A.; Youming, L. A low complexity coordinated FEXT cancellation for VDSL. In Proceedings of the International Conference on Electronics, Circuits and Systems, Tel Aviv, Israel, 13–15 December 2004. [Google Scholar]
  8. Cendrillon, R.; Ginis, G.; Van den Bogaert, E.; Moonen, M. A Near-Optimal Linear Crosstalk Precoder for Downstream VDSL. IEEE Trans. Commun. 2007, 5, 860–863. [Google Scholar] [CrossRef] [Green Version]
  9. Zafaruddin, S.M.; Prakriya, S.; Prasad, S. Performance Analysis of Zero Forcing Crosstalk Canceler in Vectored VDSL2. IEEE Signal Process. Lett. 2012, 4, 219–222. [Google Scholar] [CrossRef]
  10. Bergel, I.; Leshem, A. The performance of zero forcing DSL systems. IEEE Signal Process. Lett. 2013, 5, 527–530. [Google Scholar] [CrossRef]
  11. Yu, W.; Cioffi, J.M. Sum capacity of Gaussian vector broadcast channels. IEEE Trans. Inf. Theory 2004, 9, 1875–1892. [Google Scholar] [CrossRef]
  12. Gaur, S.; Gao, L.; Acharya, J. A Practical GDFE Precoder for Multiuser MIMO Systems. IEEE Trans. Wirel. Commun. 2012, 10, 3668–3676. [Google Scholar] [CrossRef]
  13. ITU-T Recommendation G.993.5 Self-FEXT Cancellation (Vectoring) for Use with VDSL2 Transceivers. 2015. Available online: https://www.itu.int/rec/T-REC-G.993.5/en (accessed on 2 April 2018).
  14. Forouzan, A.R.; Moonen, M.; Timmers, M.; Guenach, M.; Maes, J. On the Achievable Bit Rates of DSL Vectoring Techniques in the Presence of Alien Crosstalkers. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012. [Google Scholar]
  15. Strobel, R.; Barthelme, A.; Utschick, W. Zero-Forcing and MMSE Precoding for G.fast. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015. [Google Scholar]
  16. Mazzenga, F.; Giuliano, R. Analytical Performance Evaluation of VDSL2. IEEE Commun. Lett. 2017, 1, 44–47. [Google Scholar] [CrossRef]
  17. Mazzenga, F.; Giuliano, R. Analytical framework for preliminary planning of very high-speed digital subscriber line access networks. Information (Switzerland) 2017, 8, 86. [Google Scholar] [CrossRef]
  18. Mazzenga, F.; Giuliano, R. Log-normal Approximation for VDSL Performance Evaluation. IEEE Trans. Commun. 2016, 12, 5266–5277. [Google Scholar] [CrossRef]
  19. Beaulieu, N.C.; Abu-Dayya, A.A.; McLane, P.J. Estimating the distribution of a sum of independent log-normal random variables. IEEE Trans. Commun. 1995, 12, 2869–2873. [Google Scholar] [CrossRef]
  20. Van den Brink, R. G.fast: Far-End Crosstalk in Twisted Pair Cabling; Measurements and Modelling; ITU-Telecommunication Standardization Sector Temporary Document 11RV-022, ITU-T-SG15, VA; International Telecommunication Union: Geneva, Switzerland, 2011. [Google Scholar]
  21. Mehta, N.; Wu, J.; Molisch, A.; Zhang, J. Approximating a Sum of Random Variables with a Lognormal. IEEE Trans. Wirel. Commun. 2007, 7, 2690–2699. [Google Scholar] [CrossRef]
Figure 1. Considered FttC/FttDp generic interference scenario, where { L i } are the distances of the buildings from the Cabinet.
Figure 1. Considered FttC/FttDp generic interference scenario, where { L i } are the distances of the buildings from the Cabinet.
Information 09 00108 g001
Figure 2. Cumulative distribution functions (CDFs) for the bit rate per user in the vectoring case with p = 1 for N = 20 ; exact (solid) and Gaussian approximation (dots).
Figure 2. Cumulative distribution functions (CDFs) for the bit rate per user in the vectoring case with p = 1 for N = 20 ; exact (solid) and Gaussian approximation (dots).
Information 09 00108 g002
Figure 3. CDFs of the vit rate per user in the vectoring case ( p = 1 ): d = 200 m, and variable N. Exact (solid) and Gaussian approximation (asterisks) results are shown.
Figure 3. CDFs of the vit rate per user in the vectoring case ( p = 1 ): d = 200 m, and variable N. Exact (solid) and Gaussian approximation (asterisks) results are shown.
Information 09 00108 g003
Figure 4. CDFs of the bit rate per user in the non-vectoring case for G.fast: N = 20 . Exact (solid) and Gaussian approximation (asterisks) results are shown.
Figure 4. CDFs of the bit rate per user in the non-vectoring case for G.fast: N = 20 . Exact (solid) and Gaussian approximation (asterisks) results are shown.
Information 09 00108 g004
Figure 5. CDFs of the bit rate per user in the vectoring case ( p = 1 ) for G.fast: N = 20 . Exact (solid) and Gaussian approximation (asterisks) results are shown.
Figure 5. CDFs of the bit rate per user in the vectoring case ( p = 1 ) for G.fast: N = 20 . Exact (solid) and Gaussian approximation (asterisks) results are shown.
Information 09 00108 g005
Figure 6. Bit rate per user vs. distance for VDSL2 with a variable number of users N. Non-vectoring ( p = 0 ), and vectoring ( p = 1 ) cases are displayed.
Figure 6. Bit rate per user vs. distance for VDSL2 with a variable number of users N. Non-vectoring ( p = 0 ), and vectoring ( p = 1 ) cases are displayed.
Information 09 00108 g006
Figure 7. Maximum distance vs. number of users that can be served at a target bit rate R b , for the vectoring case p = 1 , 5-th percentile.
Figure 7. Maximum distance vs. number of users that can be served at a target bit rate R b , for the vectoring case p = 1 , 5-th percentile.
Information 09 00108 g007
Figure 8. Mean (solid) and 5-th percentile (dashed) of the bit rate per user in the non-vectoring ( p = 0 ) and vectoring cases with p = 1 and p = 2 : N = 20 .
Figure 8. Mean (solid) and 5-th percentile (dashed) of the bit rate per user in the non-vectoring ( p = 0 ) and vectoring cases with p = 1 and p = 2 : N = 20 .
Information 09 00108 g008
Figure 9. Bit rate loss percentage as a function of the distance. Non-vectoring ( p = 0 ), and vectoring cases, with p = 1 and p = 2 , are shown.
Figure 9. Bit rate loss percentage as a function of the distance. Non-vectoring ( p = 0 ), and vectoring cases, with p = 1 and p = 2 , are shown.
Information 09 00108 g009
Figure 10. G.fast bit rate vs. distance for f S = 2.2 MHz, f S = 17.664 MHz, and f S = 35.32 MHz.
Figure 10. G.fast bit rate vs. distance for f S = 2.2 MHz, f S = 17.664 MHz, and f S = 35.32 MHz.
Information 09 00108 g010
Figure 11. Mean and 5-th percentile in the non-vectoring p = 0 and vectoring cases, with p = 1 and p = 2 , for G.fast with N = 20 .
Figure 11. Mean and 5-th percentile in the non-vectoring p = 0 and vectoring cases, with p = 1 and p = 2 , for G.fast with N = 20 .
Information 09 00108 g011
Figure 12. G.fast bit rate loss percentage as a function of distance. Non-vectoring ( p = 0 ) and vectoring, with p = 1 and p = 2 , results are shown.
Figure 12. G.fast bit rate loss percentage as a function of distance. Non-vectoring ( p = 0 ) and vectoring, with p = 1 and p = 2 , results are shown.
Information 09 00108 g012

Share and Cite

MDPI and ACS Style

Mazzenga, F.; Giuliano, R. A Worst Case Performance Analysis of Approximated Zero Forcing Vectoring for DSL Systems. Information 2018, 9, 108. https://doi.org/10.3390/info9050108

AMA Style

Mazzenga F, Giuliano R. A Worst Case Performance Analysis of Approximated Zero Forcing Vectoring for DSL Systems. Information. 2018; 9(5):108. https://doi.org/10.3390/info9050108

Chicago/Turabian Style

Mazzenga, Franco, and Romeo Giuliano. 2018. "A Worst Case Performance Analysis of Approximated Zero Forcing Vectoring for DSL Systems" Information 9, no. 5: 108. https://doi.org/10.3390/info9050108

APA Style

Mazzenga, F., & Giuliano, R. (2018). A Worst Case Performance Analysis of Approximated Zero Forcing Vectoring for DSL Systems. Information, 9(5), 108. https://doi.org/10.3390/info9050108

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop