Enhanced signal acquisition based on adaptive multiresolution modulation
10742473 ยท 2020-08-11
Assignee
Inventors
Cpc classification
H04L41/0816
ELECTRICITY
H04L27/18
ELECTRICITY
H04L27/3405
ELECTRICITY
H04B1/0475
ELECTRICITY
International classification
H04L27/34
ELECTRICITY
Abstract
A transmitter in a network transmits transmissions in accordance with an asymmetric signal constellation. A channel impairment in the network is detected. In response, a transmitter adjustment value for adjusting modulations at the transmitter is determined, the transmitter adjustment value determined to increase asymmetry of the asymmetric signal constellation. Signal acquisition may be improved by transmitting, at the transmitter, transmissions, based on transmitting using the determined transmitter adjustment value.
Claims
1. A method comprising: transmitting, at a transmitter in a network, transmissions in accordance with an asymmetric signal constellation; detecting a channel impairment in the network; in response to detecting the channel impairment, determining a transmitter adjustment value for adjusting modulations at the transmitter, the transmitter adjustment value determined to increase asymmetry of the asymmetric signal constellation; improving signal acquisition by transmitting, at the transmitter, transmissions, based on transmitting using the determined transmitter adjustment value; and wherein increasing the asymmetry of the asymmetric signal constellation includes modifying a size of a current signal constellation in use for transmitting at the transmitter.
2. The method of claim 1, wherein improving the signal acquisition includes transmitting, at the transmitter, transmissions, based on transmitting using the determined transmitter adjustment value, in lieu of increasing power.
3. The method of claim 1, wherein the transmitter transmits in accordance with adaptive multiresolution modulation.
4. The method of claim 1, wherein the asymmetric signal constellation is based on a representation of signals modulated by a digital modulation scheme.
5. A method comprising: receiving, at a network receiver, from a transmitter, a first receiver adjustment value corresponding to a first transmitter adjustment value; configuring the network receiver to demodulate signals received from the transmitter, in accordance with an asymmetric signal constellation, based on the first transmitter adjustment value; receiving, at the network receiver, a transmission from the transmitter; demodulating the received transmission, based on demodulating using the received first receiver adjustment value corresponding to the first transmitter adjustment value; receiving a second receiver adjustment value corresponding to a second transmitter adjustment value, the second transmitter adjustment value based on increasing asymmetry of the asymmetric signal constellation; and improving signal acquisition by demodulating, at the network receiver, transmissions, based on demodulating using the received second receiver adjustment value.
6. The method of claim 5, further comprising: reconfiguring the network receiver to demodulate received transmissions in accordance with the second receiver adjustment value.
7. The method of claim 5, wherein configuring the network receiver includes modifying a shape of a current decision region in use for demodulating received transmissions at the network receiver.
8. The method of claim 5, wherein configuring the network receiver includes modifying a shape of a current signal constellation in use for demodulating received transmissions at the network receiver.
9. The method of claim 5, wherein configuring the network receiver includes configuring the network receiver to receive the transmission in accordance with adaptive multiresolution modulation.
10. The method of claim 5, wherein configuring the network receiver includes modifying a size of a current decision region in use for demodulating received transmissions at the network receiver.
11. The method of claim 5, wherein configuring the network receiver includes modifying a shape of a current signal constellation in use for demodulating received transmissions at the network receiver, to the asymmetric signal constellation.
12. A system comprising: a transmitter in a network, the transmitter including: at least one hardware device processor; and a non-transitory computer-readable storage medium storing instructions that are executable by the at least one hardware device processor to: transmit transmissions in accordance with an asymmetric signal constellation; detect a channel impairment in the network; in response to detecting the channel impairment, determine a transmitter adjustment value for adjusting modulations at the transmitter, the transmitter adjustment value determined to increase asymmetry of the asymmetric signal constellation by modifying a size of a current signal constellation in use for transmitting at the transmitter; and improve signal acquisition by transmitting transmissions, based on transmitting using the determined transmitter adjustment value.
13. The system of claim 12, wherein improving the signal acquisition includes transmitting, at the transmitter, transmissions, based on transmitting using the determined transmitter adjustment value, in lieu of increasing power.
14. The system of claim 12, wherein the transmitter transmits in accordance with adaptive multiresolution modulation.
15. The system of claim 12, wherein the asymmetric signal constellation is based on a representation of signals modulated by a digital modulation scheme.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
DETAILED DESCRIPTION
(17)
(18) In response to detecting the channel impairment, a transmitter adjustment value for adjusting modulations at the transmitter may be determined, the transmitter adjustment value determined to increase asymmetry of the asymmetric signal constellation (1406). Signal acquisition may be improved by transmitting, at the transmitter, transmissions, based on transmitting using the determined transmitter adjustment value (1408).
(19) For example, the transmitter may be configured to transmit in accordance with the transmitter adjustment value.
(20) For example, increasing the asymmetry of the asymmetric signal constellation may include modifying a shape of a current signal constellation in use for transmitting at the transmitter. For example, increasing the asymmetry of the asymmetric signal constellation may include modifying a size of a current signal constellation in use for transmitting at the transmitter.
(21) For example, improving the signal acquisition may include transmitting, at the transmitter, transmissions, based on transmitting using the determined transmitter adjustment value, in lieu of increasing power. For example, the transmitter may transmit in accordance with adaptive multiresolution modulation.
(22) For example, the asymmetric signal constellation may be based on a representation of signals modulated by a digital modulation scheme.
(23) An embodiment of the signal acquisition method 100 enhances signal acquisition in the presence of channel impairments by making the transmitted modulation constellation more asymmetric. In the presence of channel impairments, the likelihood of signal acquisition may be increased through modulation constellation shape pre-distortion instead of increasing power. Using AMM for enhanced signal acquisition allows a radio to save energy and establish the communications link. Once the radio receiver is able to lock-in frequency, phase, and time using the asymmetric modulation, less asymmetric modulation, symmetric modulation, and/or higher order modulation may be used by interpolating the known frequency, phase, and time offset.
(24) A performance gain is achieved by mapping higher priority buffer bits to higher protected bit positions within the symbol and other bits to less protected bit positions, enabling partial modulated symbol recovery. Because of the partial modulated symbol recovery facilitated, AMM may avoid the cliff effect in which all data transmission cuts out when the channel becomes very poor. Instead, there may be a graceful degradation and the most important data may still be sent through all but the worst channel outages.
(25) Utilizing the UEP facilitated by AMM, asymmetrical modulation may be used for signal acquisition under poor channel conditions. Adaptive forward error correction (FEC) may also enable UEP (see, e.g., Yang). However, the benefits of FEC may only be realized once the signal has been successfully acquired in terms of frequency, phase, and time by the radio receiver. Consequently, only UEP via AMM may be used to increase the likelihood of signal acquisition devoid using additional power or bandwidth.
(26)
(27)
(28) At a receiver, demodulation, symbol-to-bit translation, may be based on pre-defined decision regions.
(29) The adaptive demodulation scheme is based on a maximum likelihood (ML) detection rule for each bit. As shown in
(30) (a) For 1.sup.st bit: If (/2)<<(/2), i.sub.1=0; else i.sub.1=1.
(31) (b) For 2.sup.nd bit: If 0<<, i.sub.2=0; else i.sub.2=1.
(32) (c) For 3.sup.rd bit: If (/2)<<(/2) or +(/2)<<(/2), i.sub.3=0; else i.sub.3=1.
(33)
(34) It may be noted that for asymmetric modulation, ML decoding is performed on individual bits instead of the received symbol. This may facilitate partial symbol recovery, which increases spectral efficiency and throughput under disadvantaged channel conditions. For symmetric modulation, ML decoding may be executed on the received symbol. Consequently, there is no partial symbol recovery (meaning that either all of the bits or none of the bits are demodulated correctly). Thus, asymmetric modulations may be decoded with lower uncoded BERs (Bit Error Rates) than can symmetric modulations in the low to moderate signal-to-noise ratio (SNR)/CNR regions.
(35) For symmetric 8-PSK, all of the constellation symbols are equidistant in the signal space. Thus, for symmetric 8-PSK, the BER and PER characteristics of each bit are roughly the same. For asymmetric 8-PSK, as the constellation becomes more asymmetric, bit 1 is farther from the decision region and less vulnerable to corruption. However, bit 2 and especially bit 3 may move closer to the decision regions and more vulnerable to corruption. In essence, asymmetric modulation provides more protection to the MSB(s) at the expense of less protection of the least significant bit(s) (LSB(s)).
(36) Using asymmetric modulation, the receiver may more easily perform signal acquisition (frequency, phase, and time lock), because the MSB is more protected and may be more easily demodulated. LSBs may benefit from this because the frequency, phase, and time offset is the same as the MSB which may more easily be determined. Consequently, signal acquisition may be enhanced for asymmetric modulation.
(37) Emulated over-the-air performance of AMM was characterized using two Universal Software Radio Peripherals (USRPs) and a Spirent SR5500 Wireless Channel Emulator. One USRP was used as an AMM transmitter. Another USRP was used as an AMM receiver. The SR5500 wireless channel emulator was used to accurately emulate complex wideband wireless channel characteristics such as time-varying multi-path, fading, and channel loss. The SR5500 enabled a thorough, structured approach to receiver performance characterization through a programmable and repeatable set of emulated radio channel conditions. The SR5500 replicates real-world deployment conditions using powerful digital signal processing techniques, enabling the isolation of performance issues early in development and design verification process.
(38) For Quadrature Phase Shift Keying (QPSK), at SNR>10 dB (decibels), the BER for all levels of asymmetry () is zero. For =0.5 (symmetric modulation), the BERs for bit 1 and bit 2 are roughly the same for a given SNR. As the modulation constellation becomes more asymmetric, for =0.4 and =0.3, the UEP between bit 1 and bit 2 becomes more apparent. At SNR=6 dB, for =0.5, bit 1 and bit 2 encounter several bit errors. At the same SNR, for =0.4 and =0.3, bit 1 has approximately the same BER. However, bit 2 is received error-free. At SNR=3 dB, a similar trend is observed. For the asymmetric modulations, bit 2 is more protected than bit 1. As is decreased and the constellation becomes more asymmetric, the UEP disparity between bit 1 and bit 2 increases. At SNR=1 dB, the performance is substantially degraded for all values (0.3 through 0.5) tested. For this SNR level, nearly half of all the received bits for both bit classes are erroneous. However, even in this degraded state, for =0.4 and =0.3, bit 2 has fewer errors than bit 1. Table 1, shown below, lists the BERs recorded for each case tested for QPSK.
(39) TABLE-US-00001 TABLE 1 BER measured over the air for QPSK for an attenuated path loss channel. SNR = 0.5 = 0.4 = 0.3 (dB) Bit 1 Bit 2 Bit 1 Bit 2 Bit 1 Bit 2 20 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 15 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 10.5 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 6 7.04E03 6.26E03 5.57E03 0.00E+00 3.70E03 0.00E+00 3 3.33E02 1.72E02 2.16E02 9.77E03 1.83E02 1.36E03 1 4.94E01 4.91E01 3.81E01 2.96E01 4.74E01 1.59E01
(40)
(41)
(42) For 8-PSK, at SNR=20 dB, the BER for all values is zero. For =0.5, the BERs for bit 1, bit 2, and bit 3 are roughly the same for a given SNR. As the modulation constellation becomes more asymmetric, for =0.4 and =0.3, the UEP between bit 1, bit 2, and bit 3 increases. At SNR=15 dB, for =0.5, bit 1, bit 2, and bit 3 are received error-free. At the same SNR, for =0.4 and =0.3, bit 3 is received error free. However, bit 1 and bit 2 encounter errors. In the case of the asymmetric modulations, bit 3 receives more protection at the expense of less protection for bit 1 and bit 2. However, bit 3 is already adequately protected. Thus, the asymmetry may have little to no effect on bit 3. However, with less protection, bit 1 and bit 2 may become vulnerable to received bit errors. From this, it may be noted that if the SNR is marginally sufficient for error free communications for symmetric modulation, making the constellation more asymmetric may actually decrease performance. At SNR=10 dB, for =0.5, bit 1, bit 2, and bit 3 encounter several bit errors. For =0.4 and =0.3, bit 2 has approximately the same BER. However, bit 1 is received with significantly more bit errors and bit 3 is received error-free. At SNR<10 dB, a comparable trend is observed. For the asymmetric modulations, bit 3 is more protected than bit 2, and bit 2 is more protected than bit 1. As the constellation becomes more asymmetric, the UEP difference between bit 1, bit 2, and bit 3 becomes larger. At SNR=1 dB, the BER is poor for all values tested. At this SNR, approximately half of all the received bits for all bit classes are erroneous. However, for =0.4 and =0.3, bit 3 has fewer errors than bit 2, and bit 2 has fewer errors than bit 1. Table 2, shown below, lists the BERs recorded for each case tested for 8-PSK.
(43) TABLE-US-00002 TABLE 2 BER measured over the air for 8 PSK for an attenuated path loss channel. SNR = 0.5 = 0.4 = 0.3 (dB) Bit 1 Bit 2 Bit 3 Bit 1 Bit 2 Bit 3 Bit 1 Bit 2 Bit 3 20 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 00.00E+00 0.00E+00 15 0.00E+00 0.00E+00 0.00E+00 2.72E04 1.28E05 0.00E+00 1.31E02 5.92E06 0.00E+00 10.5 2.44E04 1.26E04 1.23E04 1.78E03 2.40E04 7.57E06 4.83E02 3.41E04 0.00E+00 6 1.47E01 8.72E02 8.34E02 1.39E01 1.44E02 5.35E04 1.33E01 4.42E03 0.00E+00 3 4.98E01 5.01E01 5.01E01 4.24E01 4.69E01 4.62E02 2.59E01 3.49E02 4.80E04 1 5.01E01 5.03E01 5.04E01 4.93E01 5.01E01 5.00E01 4.10E01 2.89E01 2.11E01
(44)
(45)
(46) For 16-QAM, at SNR=20 dB, the BER for all 13 values is zero. For =0.5, the BERs for bit 1, bit 2, bit 3, and bit 4 are roughly the same for a given SNR. As the constellation becomes more asymmetric, the UEP difference between bit 1, bit 2, bit 3 and bit 4 increases. At SNR=15 dB, for =0.5, bit 1, bit 2, and bit 4 are received error-free. Bit 3 is received nearly error-free. At the same SNR, for =0.4 and =0.3, bit 2 and bit 4 are received error free. However, bit 1 and bit 3 encounter errors. For the asymmetric modulations, bit 2 and bit 4 receive additional protection at the expense of less protection for bit 1 and bit 3. However, bit 2 and bit 4 are already sufficiently protected. Therefore, the asymmetry has no effect on bit 2 and bit 4. However, with less protection, bit 1 and bit 3 are more vulnerable to corruption. Thus, if the SNR is sufficient for error free communications for symmetric modulation, making the constellation more asymmetric may decrease performance. At SNR=10 dB, for =0.5, bit 1, bit 2, bit 3, and bit 4 encounter several bit errors. For =0.4 and =0.3, bit 1 and bit 3 have slightly fewer bit errors. However, bit 2 and bit 4 are received error-free. At SNR<10 dB, an analogous trend is observed. For the asymmetric modulations, bit 2 and bit 4 are more protected than bit 1 and bit 3. As the constellation becomes more asymmetric, the UEP disparity becomes greater. At SNR=1 dB, the BER is unacceptable for all 13 values tested. At this SNR, approximately half of all the received bits for all bit classes are erroneous.
(47) Table 3, shown below, lists the BERs recorded for each case tested for 16-QAM.
(48) TABLE-US-00003 TABLE 3 BER measured over the air for 16-QAM for an attenuated path loss channel. SNR = 0.5 = 0.4 = 0.3 (dB) Bit 1 Bit 2 Bit 3 Bit 4 Bit 1 Bit 2 Bit 3 Bit 4 Bit 1 Bit 2 Bit 3 Bit 4 20 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 15 0.00E+00 0.00E+00 6.85E07 0.00E+00 3.07E06 0.00E+00 1.84E05 0.00E+00 1.41E04 0.00E+00 3.49E04 0.00E+00 10.5 6.30E04 5.00E04 7.53E04 4.96E04 5.08E04 3.72E06 8.42E04 8.46E06 4.22E03 0.00E+00 6.21E03 0.00E+00 6 5.32E02 5.01E02 5.41E02 5.06E02 2.23E02 1.81E03 2.36E02 1.01E03 3.24E02 3.88E05 3.68E02 3.95E05 3 3.23E01 4.58E01 3.21E01 4.56E01 2.76E01 3.31E01 2.75E01 3.29E01 2.75E01 5.99E02 2.72E01 5.92E02 1 4.13E01 5.02E01 4.13E01 5.0E01 4.15E01 4.98E01 4.15E01 4.98E01 4.18E01 4.83E01 4.18E01 4.82E01
(49)
(50) To study the effects of Rayleigh fading on AMM, the SNR resulting in error-free communications for symmetric and asymmetric modulation was determined. For all three modulations (QPSK, 8-PSK, and 16-QAM), the error-free SNR was established to be 20 dB. At SNR=15 dB, symmetric QPSK, 8-PSK, and 16-QAM are also error-free. In this section, symmetric and asymmetric constellations are evaluated under Rayleigh fading conditions with SNR equal to 15 and 20 dB. By performing the characterization at this SNR, it may be assured that the major contributor to degradation is Rayleigh fading and not some other phenomena. For each modulation mode, the performance is evaluated for symmetric modulation with no fading, symmetric modulation with Rayleigh fading, and asymmetric modulation with Rayleigh fading.
(51) For symmetric and asymmetric modulations at SNR=20 dB, devoid of fading, no bit errors are received. With fading, many errors are received. However, the number of errors received using asymmetric modulations is substantially less than that of symmetric modulations. In most cases, using asymmetric modulations reduces the number of bit errors by at least an order of magnitude. In some cases, the asymmetric modulations deliver error-free communications in the presence of fading. As illustrated in
(52) As shown,
(53) As shown,
(54) For 8-PSK and 16-QAM, with symmetric modulation under fading, the received thumbnails are completely unrecognizable. With asymmetric modulation, the quality is substantially enhanced. Tables 4, 5, and 6 include the BER captured over-the-air for each modulation mode under Rayleigh fading conditions. Table 4, shown below, illustrates the BER measured over the air for QPSK for a Rayleigh fading channel.
(55) TABLE-US-00004 TABLE 4 BER measured over the air for QPSK for a Rayleigh fading channel. SNR = 0.5 = 0.4 = 0.3 Fading (dB) Bit 1 Bit 2 Bit 1 Bit 2 Bit 1 Bit 2 Rayleigh 20 3.49E03 5.46E03 1.66E04 8.19E03 3.25E04 0.00E+00 Fading 15 1.59E01 1.47E01 1.22E01 1.41E01 3.38E02 8.24E02 No 20 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 Fading 15 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00
(56) Table 5, shown below, illustrates the BER measured over the air for 8-PSK for a Rayleigh fading channel.
(57) TABLE-US-00005 TABLE 5 BER measured over the air for 8-PSK for a Rayleigh fading channel. SNR = 0.5 = 0.4 = 0.3 Fading (dB) Bit 1 Bit 2 Bit 3 Bit 1 Bit 2 Bit 3 Bit 1 Bit 2 Bit 3 Rayleigh 20 8.10E02 4.23E02 4.12E02 3.25E02 7.22E03 3.17E03 1.26E01 3.56E03 0.00E+00 Fading 15 3.33E01 2.90E01 2.90E01 1.71E01 2.05E01 1.93E01 1.84E01 1.00E01 8.07E02 No 20 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+0 0.00E+00 0.00E+00 Fading 15 0.00E+00 0.00E+00 0.00E+00 2.72E04 1.28E05 0.00E+00 1.31E02 5.92E06 0.00E+00
(58) Table 6, shown below, illustrates the BER measured over the air for 16-QAM for a Rayleigh fading channel.
(59) TABLE-US-00006 TABLE 6 BER measured over the air for 16-QAM for a Rayleigh fading channel. SNR = 0.5 = 0.4 Fading (dB) Bit 1 Bit 2 Bit 3 Bit 4 Bit 1 Bit 2 Bit 3 Bit 4 Rayleigh 20 6.75E02 7.27E02 6.87E02 7.56E02 2.73E02 1.53E02 2.95E02 1.63E02 Fading 15 3.85E01 4.96E01 3.86E01 4.97E01 3.37E01 3.83E01 3.40E01 3.86E01 No 20 0.00E+00 0.00E+00 0.00E+00 0.00 E+00 0.00E+00 0.00E+00 0.00E+00 0.00E+00 Fading 15 0.00E+00 0.00E+00 6.85E07 0.00E+00 3.07E06 0.00E+00 1.84E05 0.00E+00 SNR = 0.3 Fading (dB) Bit 1 Bit 2 Bit 3 Bit 4 Rayleigh 20 3.07E02 3.33E06 3.59E02 6.59E06 Fading 15 3.10E01 2.22E01 3.14E01 2.24E01 No 20 0.00E+00 0.00E+00 0.00E+00 0.00E+00 Fading 15 1.41E04 0.00E+00 3.49E04 0.00E+00
(60) In summary, AMM may advantageously enhance signal acquisition (frequency and phase lock) because the most protected bit stream(s) is(are) easily demodulated. With asymmetric modulation, the most important bits are highly protected and may be demodulated under less favorable channel conditions relative to symmetric modulation. Thus, AMM for signal acquisition may substantially enhance the robustness of a communications system.
(61) Using FEC for UEP is only useful to higher layers after the transmitted symbols have been demodulated into bits at the physical layer. Consequently, FEC may be useless and may not be leveraged unless signal acquisition is successful. Only UEP via AMM may be used to increase the likelihood of signal acquisition without using additional power (which is undesirable in mobile wireless communications).
(62) Example aspects discussed herein may be implemented as a series of modules, either functioning alone or in concert with physical electronic and computer hardware devices. Example techniques discussed herein may be implemented as a program product comprising a plurality of such modules, which may be displayed for a user. As used herein, the term module generally refers to a software module. A module may be implemented as a collection of routines and data structures that performs particular tasks or implements a particular abstract data type. Modules generally are composed of two parts. First, a software module may list the constants, data types, variables, and routines that may be accessed by other modules or routines. Second, a module may be configured as an implementation, which may be private (i.e., accessible only to the module), and which contains the source code that actually implements the routines or subroutines upon which the module is based. Such modules may be utilized separately and/or together locally and/or remotely to form a program product thereof, that may be implemented through non-transitory machine-readable recordable media.
(63) Various storage media, such as magnetic computer disks, optical disks, and electronic memories, as well as non-transitory computer-readable storage media and computer program products, can be prepared that can contain information that can direct a device, such as a micro-controller, to implement the above-described systems and/or methods. Once an appropriate device has access to the information and programs contained on the storage media, the storage media can provide the information and programs to the device, enabling the device to perform the above-described systems and/or methods.
(64) For example, if a computer disk containing appropriate materials, such as a source file, an object file, or an executable file, were provided to a computer, the computer could receive the information, appropriately configure itself and perform the functions of the various systems and methods outlined in the diagrams and flowcharts above to implement the various functions. That is, the computer could receive various portions of information from the disk relating to different elements of the above-described systems and/or methods, implement the individual systems and/or methods, and coordinate the functions of the individual systems and/or methods.
(65) Features discussed herein are provided as example techniques that may be implemented in many different ways that may be understood by one of skill in the art of computing, without departing from the discussion herein. Such features are to be construed only as example features, and are not intended to be construed as limiting to only those detailed descriptions.
(66)
(67) The network receiver may be configured to demodulate signals received from the transmitter, in accordance with an asymmetric signal constellation, based on the first transmitter adjustment value (1504). At the network receiver, a transmission may be received from the transmitter (1506). The received transmission may be demodulated, based on demodulating using the received first receiver adjustment value corresponding to the first transmitter adjustment value (1508).
(68) A second receiver adjustment value corresponding to a second transmitter adjustment value may be received, the second transmitter adjustment value based on increasing asymmetry of the asymmetric signal constellation (1510). Signal acquisition may be improved by demodulating, at the network receiver, transmissions, based on demodulating using the received second receiver adjustment value (1512). For example, the network receiver may be reconfigured to demodulate received transmissions in accordance with the second receiver adjustment value.
(69) Configuring the network receiver may, for example include a) modifying a shape of a current decision region in use for demodulating received transmissions at the network receiver; b) modifying a shape of a current signal constellation in use for demodulating received transmissions at the network receiver; c) configuring the network receiver to receive the transmission in accordance with adaptive multiresolution modulation; d) modifying a size of a current decision region in use for demodulating received transmissions at the network receiver; and e) modifying a shape of a current signal constellation in use for demodulating received transmissions at the network receiver, to the asymmetric signal constellation.
(70) One skilled in the art of computing will appreciate that many other types of techniques may be used for examples discussed herein, without departing from the discussion herein. Features discussed herein are provided as example techniques that may be implemented in many different ways that may be understood by one of skill in the art of computing, without departing from the discussion herein. Such features are to be construed only as example features, and are not intended to be construed as limiting to only those detailed descriptions.
(71) For example, the one or more processors (e.g., hardware device processors) may be included in at least one processing apparatus. One skilled in the art of computing will understand that there are many configurations of processors and processing apparatuses that may be configured in accordance with the discussion herein, without departing from such discussion.
(72) In this context, a component or module may refer to instructions or hardware that may be configured to perform certain operations. Such instructions may be included within component groups of instructions, or may be distributed over more than one group. For example, some instructions associated with operations of a first component may be included in a group of instructions associated with operations of a second component (or more components). For example, a component herein may refer to a type of functionality that may be implemented by instructions that may be located in a single entity, or may be spread or distributed over multiple entities, and may overlap with instructions and/or hardware associated with other components.
(73) In this context, a memory may include a single memory device or multiple memory devices configured to store data and/or instructions. Further, the memory may span multiple distributed storage devices. Further, the memory may be distributed among a plurality of processors. One skilled in the art of computing will understand that there may be many ways of accomplishing the features discussed herein.
(74) It will be understood that many additional changes in the details, materials, steps and arrangement of parts, which have been herein described and illustrated to explain the nature of the invention, may be made by those skilled in the art within the principle and scope of the invention as expressed in the appended claims.