Chip blanking and processing in SCDMA to mitigate impulse and burst noise and/or distortion

ABSTRACT

Systems and methods are disclosed for detecting temporary high level impairments, such as noise or interference, for example, in a communications channel, and subsequently, mitigating the deleterious effects of the dynamic impairments. In one embodiment, a preliminary decision is made on at least one signal transmitted over the communications channel. The at least one signal is remodulated and the impairment is determined using the at least one remodulated signal.

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application is a continuation-in-part of, and claims benefit of and priority from, application Ser. No. 10/000,415 filed Nov. 20, 2001, titled “Detection and Mitigation of Temporary Impairments in a Communications Channel”, which is related to, and claims benefit of and priority from, Provisional Application No. 60/296,884 filed Jun. 8, 2001, titled “Detection and Mitigation of Temporary Impairments in a Communications Channel”, the complete subject matter of each of which is incorporated herein by reference in its entirety.

FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

[0002] [Not Applicable]

SEQUENCE LISTING

[0003] [Not Applicable]

MICROFICHE/COPYRIGHT REFERENCE

[0004] [Not Applicable]

BACKGROUND OF THE INVENTION

[0005] The present invention relates to communications systems, all of which are inherently limited in their capacity (or rate) of information transfer by channel impairments. More specifically, the present invention relates to information transfer between a plurality of Cable Modems (alternatively referred to as “CM”) and a Cable Termination System (alternatively referred to as “CMTS” or “headend”).

[0006] Communication systems are subjected to impairments, generally of a brief or transitory duration. One example of such impairment is often referred to by the generic term “noise.” Noise sometimes emanates for example, from within electrical components themselves, such as amplifiers and even passive resistors. Another example of such impairment is referred to as “interference,” which is usually taken to be some unwanted manmade emission, from another communications system such as radio or from switching circuits in a home or automobile for example. “Distortion” is a yet another example of such impairment, and includes linear distortion in the channel, such as pass-band ripple or non-flat group delay for example, and nonlinear distortion, such as compression in an overdriven amplifier for example. It is contemplated that there are many other types of impairments that may also adversely affect communications in a channel.

[0007] Often, such impairments may by dynamic in nature. In many cases, the impairment may be at one level of severity most of the time. In this instance, the communications system may be designed or optimized in some fashion to operate at that specific level of impairment. Occasionally, however, one or more of impairments may become so severe as to preclude the operation of such communications system optimized for the more ordinary level of impairments.

[0008] Previously, when a large interference or burst of noise occasionally impinges upon the receiver (a CM for example), it is known to simply blank out the received signal to mitigate such large out-of-the ordinary bursts of received power. Often, analog processing means are used, almost at, if not right at, the receiver input. This may be done especially to protect CM's or other sensitive receiver front-ends from damage. While this technique may provide some benefit in circumstances where the noise or interference power dwarfs the signal-of-interest power, it does not protect against the many other impairments that have power more on the order of the signal-of-interest power (or even much less). Thus blanking does not, by itself, provide the receiver with a means to improve its overall performance in the presence of the lost information, i.e., the information content concurrent with the large noise burst.

[0009] One known technique, a forward error correction technique (alternatively referred to as “FEC”) has been applied, even unknowingly, to solve this problem. FEC techniques incorporate soft-decision decoding, such as is common with convolutional error correction codes and the Viterbi decoding algorithm. In such correction techniques, as the error power in the received signal increases, such increase is passed directly into the decision process.

[0010] Such encoding and decoding techniques have been in common practice for years, and are widely applied without thought to temporary fidelity changes in the channel. Fortunately, in the event of a change in the channel fidelity, the soft-decision decoding takes into consideration the larger error power in making signal decisions. However, unfortunately, often with a change in channel conditions, there is duration of multiple symbol intervals (in a digital communications system example) where the degradation persists. During this time some symbols may be so severely erred that they actually appear close to another possible (but wrong or incorrect) symbol. In such event, the soft-decision decoder actually “thinks” it has received a low error power, and may rate the wrong signal with a high confidence. This becomes much more likely as the constellation density (of a QAM constellation for example) is increased for high rate communications,

[0011] Additional techniques, such as a Time Division Multiple Access technique (alternatively referred to as “TDMA”) have been applied to solve this problem. In this technique, one or more carrier frequencies are shared among a plurality of CMs. Known standards, DOCSIS 1.0 and 1.1 for example, each of which are incorporated herein in their entirety, define the physical layer, and additional layers, in which a plurality of CMs transmit data upstream to and receive data downstream from the CMTS or headend. In this technique, each upstream carrier frequency or channel assignment is general shared by a plurality of CMs, each being granted time slots wherein they may use the channel. These grants are allocated and made known to the CMs via the downstream broadcast transmissions. Some of the grants only enable a single CM to transmit, while other time slot grants are in contention mode. That is some, or all, of the CMs may attempt to use the grant. However, if more than one CM attempts to use a grant in the contention mode, all the CMs will likely be unsuccessful in channel use.

[0012] Yet another technique, such as direct-sequence spread-spectrum modulation technique discussed by J. Young and J. Lehnert, in their paper titled “Analysis of DFT-Based Frequency Excision Algorithms for Direct-Sequence Spread-Spectrum Communications,” IEEE Trans. Comm., vol. 46, pp. 1076-1087, August 1998, the complete subject matter of which is incorporated herein by reference in its entirety, has also been applied to solve this problem. In this technique, frequency excision is used to eliminate narrow-band energy, thus enhancing the capacity of direct-sequence spread-spectrum modulation to reject narrow-band interference. However, this disclosed technique focuses on particular waveforms having energy concentrated about a narrow band.

[0013] Yet still another technique, such as such as Code-Division Multiple Access technique (alternatively referred to as “CDMA”) discussed by M. Lops, G. Ricci and A. Tulino, in their paper titled “Narrow-Band-lnterference Suppression in Multiuser CDMA Systems,” IEEE Trans. Comm., vol. 46, pp. 1163-1175, September 1998, the complete subject matter of which is incorporated herein by reference in its entirety, has also been applied to solve this problem. In this technique, a decision is made regarding the bit(s) transmitted by each user over a communication system. This decision is based on the projection of the observables on to the orthogonal complement to the subspace spanned by the other users' signatures and the narrow-band interference. The disclosed technique recognizes that the blanking and iterative processing may be performed with an orthogonal basis set decomposition of the frequency domain.

[0014] Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of such systems with the present invention as set forth in the remainder of the present application with reference to the drawings.

BRIEF SUMMARY OF THE INVENTION

[0015] Features of the present invention may be found in a method of impairment mitigation for use in a communications system. In one embodiment, a preliminary decision is made on at least one signal transmitted over the communications channel. The at least one signal is remodulated and the impairment is determined using the at least one remodulated signal.

[0016] In one embodiment, the method of mitigating impairment includes making a preliminary decision on each of the signals transmitted in at least one spreading frame and remodulating each of the signals using at least one spreading code. Distortion between the signals and the remodulated signals and any suspect signals are identified. The method further includes blanking the suspect signals, forming partially remodulated energy. A composite transmitted value is then reconstructed for each of the blanked signals and partial correlation results are formed.

[0017] In another embodiment, the present invention relates to a method of mitigating impairment in a communication system. In this embodiment, the method comprises receiving symbols and determining a closest constellation point to each of the symbols. error power is calculated for all of the symbols using the closest constellation point. A determination is made to keep or erase each of the symbols, such that the symbols are kept if the error power is less than a predetermined threshold of error power and are erased if the error power is greater than the threshold of error power. This process may be repeated for each set of symbols received.

[0018] In yet another embodiment, the present invention relates to a method for mitigating impairment in a communication system. In this embodiment, the method comprises receiving a plurality of chips in a spreading interval and determining a closest constellation point to each of the chips. Error power is calculated for each of the chips using the closest constellation point. A determination is made to keep or erase each of the chip, such that the chips are kept if the error power is less than a predetermined threshold of error power and are erased if the error power is greater than the threshold of error power.

[0019] These and other advantages and novel features of the present invention, as well as details of an illustrated embodiment thereof, will be more fully understood from the following description and drawings.

BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS

[0020]FIG. 1 illustrates a block diagram of a generic communication system that may be employed in connection with one embodiment of the present invention.

[0021]FIG. 2 illustrates a block diagram of an impairment mitigation system in accordance with one embodiment of the present invention.

[0022]FIG. 3 illustrates a flow diagram of one embodiment of a method that may be performed using the system of FIG. 2, in accordance with one embodiment of the present invention.

[0023]FIG. 4 illustrates a flow diagram of another embodiment of a method that may be performed using the system of FIG. 2, in accordance with one embodiment of the present invention.

[0024]FIGS. 5A & 5B illustrate flow diagrams for impairment mitigation in accordance with specific embodiments of the present invention.

[0025]FIG. 6 illustrates a block diagram of an impairment mitigation system in accordance with another embodiment of the present invention.

[0026]FIGS. 7A & 7B illustrate a flow diagram of a method of impairment mitigation for use in connection with digital communications in accordance with one specific embodiment of the present invention.

[0027]FIGS. 8A & 8B illustrate a flow diagram of a method of impairment mitigation used in connection with digital communications in accordance with another specific embodiment of the present invention.

[0028]FIG. 9 illustrates a flow diagram of a method that uses a fidelity metric to modify branch metrics in the decoding process, in accordance with one embodiment of the present invention.

[0029]FIG. 10 illustrates a block diagram of an impairment mitigation system that uses preliminary decoding in generating error power estimates, in accordance with one embodiment of the present invention.

[0030]FIG. 11 illustrates a flow diagram illustrating one embodiment a method of impairment mitigation that may be employed using the system of FIG. 10 in accordance with one embodiment of the present invention.

[0031]FIG. 12 illustrates a high-level flow diagram illustrating one embodiment of an alternate method of impairment mitigation that may be employed using a system similar to that illustrated in FIG. 10 in accordance with one embodiment of the present invention.

[0032]FIGS. 13A & 13B illustrate a flow diagram illustrate an alternate embodiment of a method of impairment mitigation similar to that illustrated in FIG. 12 that may be employed using a system similar to that illustrated in FIG. 10 in accordance with one embodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

[0033] The following description is made with reference to the appended figures.

[0034] According to one embodiment of the present invention, impairment, burst noise or other distortion-inducing mechanism of a duration of one up to several chips (6 chips for example) is detected. Means are provided to correct symbol decisions even in the presence of such impacted or distorted chips. More specifically, one embodiment of the present invention relates to means for detecting at least one and up to several chip(s) with increased impairment, distortion or noise as provided below. In the embodiments provided below, it is contemplated that a chip plays the roll of a symbol, although other embodiments are also contemplated as discussed.

[0035] One embodiment of the present invention relates to a spreading technique to transmit symbols at the same time on the same frequency. More specifically, one embodiment of the present invention relates to a Synchronous Code Division Multiple Access technique for communication (alternatively referred to as “SCDMA”). More specifically, this invention relates to SCDMA communications used, in one embodiment, with a DOCSIS 2.0 physical layer standard (alternatively referred to as the “DOCSIS standard”), which is incorporated herein by reference in its entirety. The DOCSIS standard defines the physical layers in which pluralities of CMs transmit data upstream to and receive data downstream from the CMTS or headend.

[0036] In one embodiment of the present invention using SCDMA, about 128 spreading codes are available for modulating each upstream-transmitted symbol. In this embodiment, up to 128 symbols may be transmitted simultaneously, each symbol using its own spreading code. Each spreading code consists of a sequence of +1 or −1 valued chips, such that there are 128 such chips in each spreading code. In this embodiment, the symbol amplitude and angle are modulated using a vector, applying the vector or its additive inverse (i.e., 180 degree rotation) to the symbol.

[0037] In one embodiment, the spreading codes are orthogonal if perfectly time-aligned, and thus the 128 symbols will not interfere with each other, even though they are transmitted at the same time on the same channel. For example, two waveforms are orthogonal to each other if, after multiplying them by each other and integrating, the result of the integration is zero. In the SCDMA used with one embodiment of the present invention, at least one but up to 128 spreading codes may be used at one time. These spreading codes may be allocated to one CM, such that that CM is granted all the spreading codes (128 for example), up to the spreading codes be allocated to 64 different CMs, such that two spreading codes are granted to each CM. QAM symbols of two bits per symbol and more are spread with the assigned codes, one spreading code per QAM symbol, although other arrangements are contemplated.

[0038] In one embodiment using SCDMA, the spreading codes are cyclical shifts of one 127-chip spreading code, except for one additional chip. Thus, in this embodiment, the spreading codes are nearly cyclical shifts of one another.

[0039] For SCDMA to work efficiently, all the spreading codes should be synchronized as they arrive at the receiver. Timing misalignments result in inter code interference (alternatively referred to as “ICI”), which may degrade performance.

[0040] Various channel impairments also degrade performance, and special receiver techniques may be employed to limit or mitigate the degradation caused by such channel performance.

[0041]FIG. 1 illustrates a block diagram of a generic communication system that may be employed in connection with one embodiment of the present invention. The system comprises a first communication node 101, a second communication node 111, and at least one channel 109 that communicatively couples the nodes 101 and 111. The communication nodes may be, for example, cable modems, DSL modems or any other type of transceiver device that transmits or receives data over one or more channels (generally referred to as CMs).

[0042] The first communication node 101 comprises a transmitter 105, a receiver 103 and a processor 106. The processor 106 may comprise, for example, a microprocessor. The first communication node 101 communicates with or is communicatively coupled to a user 100 (e.g., a computer) via communication link 110, and to the channel 109 via communication links 107 and 108. Of course, communication links 107 and 108 may be combined into a single communication link.

[0043] Similarly, the second communication node 111 comprises a transmitter 115, a receiver 114 and a processor 118. The processor 118, like processor 106, may comprise, for example, a microprocessor. The second communication node 111 likewise is communicatively coupled to the at least one channel 109 via communication links 112 and 113. Again, like communication links 107 and 108, the communication links 112 and 113 may also be combined into a single communication link. The communication node 111 may also be communicatively coupled to a user 120 (again a computer, for example) via communication link 121. In the case when communication node 111 is a headend, for example, user 120 may not be present.

[0044] During operation of the illustrated embodiment of FIG. 1, the user 100 may communicate information to the user 120 (or the headend) using the first communication node 101, the at least one channel 109 and the second communication node 111. Specifically, the user 100 communicates the information to the first communication node 101 via communication link 110. The information is transformed in the transmitter 105 to match the restrictions imposed by the at least one channel 109. The transmitter 105 then communicates the information to the at least one channel 109 via communication link 107.

[0045] The receiver 114 of the second communication node 111 receives, via communication link 113, the information from the at least one channel 109 and transforms it into a form usable by the user 120. Finally, the information is communicated from the second communication node 111 to the user 120 via the communication link 121.

[0046] Communication of information from user 120 to user 100 may also be achieved in a similar manner. In either case, the information transmitted/received may also be processed using the processors 106/118.

[0047]FIG. 2 illustrates a block diagram of an impairment mitigation system 200 in accordance with one embodiment of the present invention. The system 200 may be contained, for example, in one or both of the communication nodes of FIG. 1. Error power estimates may be generated for analog modulations on a sample-by-sample basis. A receiver 201 receives an input at input 203 of either noise (when no signal is present) or a signal with time varying distortion and/or noise, for example. The receiver 201 uses the input to generate error power estimates, and may do so either on a bit by bit basis or using a sequence of bits (or on a symbol by symbol basis or using a sequence of symbols, in a digital communications example). A sliding window 205 receives the error power estimates. The error power estimates are processed in a fidelity processor 207 and a metric for channel fidelity is continuously generated as the window progresses (i.e., over time). The behavior of the metric versus time may be catalogued (see catalogue 209) and/or analyzed and used to optimize the transmission waveform. The behavior of the metric versus time may also be used to enhance receiver performance in real-time, near-real time, or even in a post-reception, post-processing mode.

[0048] A delay 208 between the input error power estimates of the window 205 and the corresponding channel fidelity metric is known for a given fidelity processor, and is provided back (made known) to a remainder of the system. The system uses the evolving fidelity metric in its processing, which may be aided by soft decisions designated 211. Soft decisions comprise, for example, erasure decoding or standard soft decision decoding, such as Viterbi decoding. In any case, the receiver outputs an estimate of the transmitted signal (reference numeral 213).

[0049] While FIG. 2 illustrates a system having some components and functionality located outside of the receiver, it is contemplated that such system may have additional components or functionality located within the receiver, or may in fact be entirely contained within the receiver. In addition, it is also contemplated that the estimation of the error power and the processing shown as being performed within the receiver of FIG. 2, may instead be performed outside of the receiver.

[0050]FIG. 3 illustrates a flow diagram of one embodiment of a method that may be performed using the system of FIG. 2, in accordance with the present invention. In one operation of the method, the error power of an input to the system is estimated as illustrated by block 301. A fidelity metric is determined, using the error power estimate as illustrated by block 303. The determined fidelity metric is then used to decode the input as illustrated by block 305. The method illustrated in FIG. 3 may be employed on a limited basis, such as only during the presence of the signal of interest for example, or may be employed continuously. In other words, the method specifically illustrated in FIG. 3 may be employed in a continuous loop type fashion, either for a limited or extended period of time. In either case, the error power of the input is estimated over time, and fidelity metrics are determined (each using one or more error power estimates of the input) and used to decode the input over time.

[0051]FIG. 4 illustrates a flow diagram of another embodiment of a method that may be performed using the system of FIG. 2, in accordance with one embodiment of the present invention. In one embodiment, the error power of an input to the system is estimated as illustrated by block 401. A fidelity metric is determined, using the error power estimate as illustrated by block 403. The determined fidelity metric is then saved for future use in communications as illustrated by block 405. Like the method illustrated in FIG. 3, the method illustrated in FIG. 4 may be employed on a limited basis, such as only during time periods when no signal of interest is present, for example, or may be employed continuously. In other words, the method specifically identified in FIG. 4 may, like that method illustrated in FIG. 3, be employed in a continuous loop type fashion, for a limited or extended period of time. In either case, the error power of the input is estimated over time, fidelity metrics are determined (each using one or more error power estimates of the input) and information about the fidelity metrics stored for future use in communications.

[0052] Specifically, the stored information about the fidelity metrics may be used in transmit waveform optimization for example. In other words, the information may be used to determine a waveform that best suits the communication channel given what has been learned about the channel over time, as reflected in the stored fidelity metrics. The stored information about the fidelity metrics may also (or alternatively) be used in selecting receiver algorithms that are robust given the limitations of the channel, again as reflected in the stored fidelity metrics. Additional detail regarding use of catalogued channel fidelity metric information for future communications is provided below.

[0053] In one embodiment of the present invention, the methods discussed above with respect to FIGS. 3 and 4 may be used in conjunction. For example, the method of FIG. 3 may be employed when a signal of interest is present, while the method of FIG. 4 may be used when a signal of interest is not present.

[0054] The error power estimates provided previously with respect to FIGS. 2-4 may be generated in a number of ways, in the presence or absence of a signal of interest. In the absence of a signal of interest, the input power to the receiver may simply be the noise power. Filtering to the bandwidth of the signal of interest may be used if desirable.

[0055] In an embodiment where the communication system (similar to the system of FIG. 2) is a digital communications system, one particular method for gathering the error power estimates during signaling is to calculate the distance (squared, for power) between the received signal and the nearest constellation point in the digital system's signaling alphabet. This error vector is typically available or readily obtainable from a slicer in a digital communications receiver.

[0056] The length of sliding window 205 of FIG. 2 is important in its selection and application, but in general, may be any length. A shorter window is a subset of a longer window, so longer and longer windows may theoretically provide better and better channel fidelity metrics. However, in practice, the window length should, for example: (1) be sized to accommodate a given (tolerable) amount of delay (acceptable to the rest of the receiver processing) in generating the channel fidelity metric; (2) not unnecessarily increase the complexity of the overall receiver; and (3) account for the durations or dynamics expected, or previously observed, in the dominating channel impairments. For example, if transitory channel impairment has a duration of up to 10 symbols in a given digital communications system, then it is hard to justify the use of a window of 100 symbols. Similarly, a window of only 4 symbols, with the expectation of a persistence of 10 symbols of a given impairment condition, needlessly lessens the ability of the fidelity processor to make the best channel fidelity assessment, as it is denied relevant (correlated) information regarding the channel fidelity.

[0057] Many forms are contemplated for processing the sequence of error power estimates in the fidelity processor 207 of FIG. 2, which forms may depend on: (1) the complexity allowed; (2) the size of the sliding window or duration or persistence of the impairment states; (3) the delay allowed in generating the channel fidelity metrics; and (4) on the use of the channel fidelity metric (i.e., the accuracy of the metric in matching the impairment level).

[0058] In its most simple form, the fidelity processor 207 may simply compare each error power estimate against a threshold, and output a binary channel fidelity estimate—i.e., “channel OK,” and “channel degraded.” While the window in this case consists of a single sample (or a single symbol in the digital communications example), the use of the catalogue of this information, and the beneficial use of this metric in subsequent receiver processing, may be employed in one embodiment of the present invention (such as shown in FIG. 2 and discussed with respect to FIGS. 3 and 4, for example).

[0059]FIG. 5A illustrates a flow diagram of a method of impairment mitigation in accordance with one specific embodiment of the present invention, for use in connection with digital communications. First, a symbol (or set of symbols) is received as illustrated by block 501A, and the closest constellation point to each of the symbols is determined as illustrated by block 503A. As provided previously, the closest constellation point may be determined from a slicer in the receiver.

[0060] Next, the error power of the symbols is calculated using, for example, the square of the distance between the received signal and the nearest constellation point in the digital system's signaling alphabet, also as provided previously and as illustrated by block 505A. The sum of the error power of all the symbols is then compared to a threshold of error power as illustrated by block 507A. This is performed, for example, in the fidelity processor. If it is determined that the error power is greater than the threshold, it is assumed that the channel is degraded, and all the symbols are erased as illustrated by block 509A. If instead it is determined that the calculated error power of the symbols is not above the threshold (i.e., less than the threshold), it is assumed that the channel is OK, and the symbols are kept as illustrated by block 511A. In either case, the decision is communicated to the decoder as illustrated by block 513A. In other words, if the symbol is kept as illustrated by block 511A, the symbol is simply communicated to the decoder as illustrated by block 513A, whereas if the symbol is erased as illustrated by block 509A, an indication that the symbol has been erased is communicated to the decoder as illustrated by block 513A. This process is repeated for each set of symbols received.

[0061] While the method illustrated in FIG. 5A is performed on multiple symbols, it is contemplated that a subset of symbols may be considered. Furthermore, it is contemplated that one or more chip(s) (or other waveforms) may play the roll of a symbol.

[0062] For example, with SCDMA, after hard decisions are made in an iterative process or manner, these hard decisions may be remodulated and the error power calculated for each chip in the spreading interval. FIG. 5B illustrates a flow diagram of a method of impairment mitigation in accordance with one specific embodiment of the present invention. First, all 128 chips in a spreading intervalare received as illustrated by block 501B, and the closest constellation point to all the chips is determined as illustrated by block 503B. As provided previously, the closest constellation point may be determined from a slicer in the receiver. The hard decisions are remodulated as illustrated by block 504B.

[0063] Next, the error power of the chips is calculated as illustrated by block 505B. It is contemplated that blocks 503B and 505B calculate the error power of a chip using the remodulated ensemble set of symbol hard decisions (i.e., the closest constellation point for each of the demodulated spread symbols). The error power of each chip is then compared to a threshold of error power as illustrated by block 507B. If it is determined that the error power is greater than the threshold, it is assumed that the channel is degraded, and the chip is erased as illustrated by block 509B. If instead it is determined that the calculated error power of the chip is not above the threshold, it is assumed that the channel is OK, and the chip is kept as illustrated by block 511B. In either case, the decision is communicated to the decoder as illustrated by block 513B or repeated for multiple iterations. Moreover, the methods provided previously may be employed using different means for calculating the error power and different processing may be used to determine whether or not the channel is OK or whether particular symbol(s) (chips or other waveforms) should be erased or kept. In addition, the method may be employed in connection with analog communications, using samples rather than symbols. As mentioned above with respect to FIG. 4, channel fidelity metric information obtained from the fidelity processor may be stored and used for future communications. In the particular example illustrated in FIG. 5, by analyzing the duty factor of the “channel OK” versus the “channel degraded” condition, and by analyzing the relative persistence of these conditions, the transmitting waveform may be adapted to these parameters. The appropriate amount of parity in FEC coding, and the best choice of interleaver parameters in FEC employing interleaving, are strongly related to these parameters.

[0064] Similarly, as provided previously with respect to FIG. 3, the receiver may make use of this information directly. In the example of digital communications, the receiver marks the bits corresponding to the “channel degraded” condition as having very low confidence in subsequent FEC decoding. Reed-Solomon codes may accommodate both error correction and erasure marking in their decoding. By marking Reed-Solomon symbols that contain bits transmitted during “channel degraded” conditions as erasures, the decoder benefits from having more information than a typical Reed-Solomon decoder working with hard decisions only. In other words, using the side information about the channel fidelity, the decoder may produce better results (i.e., higher rate of correct decoding).

[0065] A Reed-Solomon decoder may accommodate twice as many erased symbols as it can correct erred symbols, so finding instances of degraded channel fidelity, which often lead to erred Reed-Solomon symbols benefits the decoder, and marking these as erasures, greatly benefits the decoder. If nearly all of the Reed-Solomon symbol errors are attributable to the degraded channel, and if the degraded channel is fairly accurately detected (in the fidelity processor for example), then almost twice as many instances of the degraded condition may be tolerated.

[0066] Other examples of fidelity processor include summing the error power estimates in the sliding window, and providing these (or a scaled version such as an average) as the channel fidelity estimate. Alternately, this sum or average may itself be quantized into a binary decision, or a finite number of levels (such as “channel pristine,” “channel OK,” and “channel degraded” in one example), or even compressed, via a square root operation, for example. If a dominant channel impairment is expected to persist for a duration of many symbols, then summing the error power estimates for at least several symbols increases the accuracy of the channel fidelity metric, especially during the “middle” of the impairment condition.

[0067] However, determining the precise moment when the degraded condition “turned on” and “turned off” may be difficult if a long window for summing is used, without modification. One approach is to increase the time-domain precision of the fidelity processor, is to compute the average error power during a window, and apply two thresholds, one on the average and one on individual samples of the error power estimates. The “channel degraded” assignment is only outputted at times corresponding to samples, where the average error power in the window exceeded threshold #1, AND either (a) the sample was between two samples which exceeded threshold #2, or (b) the sample was the only sample in the window which exceeded threshold #2.

[0068] Once again, a particular example may be to employ the summing of the noise power estimates within the window, as provided previously, and this result compared with a threshold. This binary channel fidelity metric is then associated with the middle sample of the window (i.e., where the delay corresponds to half the window duration). With Reed-Solomon FEC, as provided previously, the “channel degraded” associated with any bits in a Reed-Solomon symbol result in that symbol being marked for erasure in the decoding process. The method described above may again be applied to enhance the time-domain precision of the channel fidelity metric.

[0069]FIG. 6 illustrates a block diagram of an impairment mitigation system 600 in accordance with a particular embodiment of the present invention. The system 600 (similar to system 200 of FIG. 2) may be contained, for example, in one or both of the communication nodes of FIG. 1. Referring to FIG. 6, a receiver 601 receives at input 603 an input signal and/or noise, in addition to an occasional high-level noise burst, for example. The receiver, using slicer 605 and block 607, generates error power estimates. He receiver generates such error power estimates either on a bit by bit basis or using a sequence of bits (or on a symbol by symbol basis or using a sequence of symbols, in a digital communications example, or sample-by-sample in an analog waveform). A sliding window 609, depicted as a 7-tap delay line, receives the error power estimates, which are then processed in a fidelity processor 611. The fidelity processor 611 continuously generates a metric for channel fidelity as the window (i.e., time) progresses.

[0070] Specifically, 7-tap delay line 609 captures 7 consecutive error power estimates at a time, and computes an average error power using the 7 captured estimates. In addition, the highest (maximum) error power of the first 4 captured estimates is determined (i.e., estimates 1 through 4), and the highest (maximum) error power of the last 4 captured estimates (i.e., estimates 4 through 7) is likewise determined. Next, a determination is made whether the average error power calculated is greater than a first threshold, and whether both maximum error powers are greater than a second threshold. If any one is not above its respective threshold, a “channel OK” indication is sent to the receiver 601. If all three are above or greater than their respective thresholds, then a “channel degraded” indication is sent to the receiver 601. This indication may be a simple 1 bit channel fidelity metric (e.g., a “1” for channel OK and a “0” for channel degraded for example). In a digital communications example, the fidelity processor 611 generates a 1-bit channel fidelity metric over time for QAM constellations, for example.

[0071] The receiver 601 receives the channel fidelity metric as illustrated by reference numeral 613 and is aware of the 4 sample or symbol delay as illustrated by reference numeral 615. Processing block 617, knowing the channel fidelity metric and the particular sample or symbol being considered from the known delay, either erases the particular sample or symbol being considered (corresponding to a “channel degraded” fidelity metric), or keeps the particular sample or symbol being considered (corresponding to a “channel OK” fidelity metric). This process is repeated so that the error power estimate corresponding to each sample or symbol is considered by the fidelity processor 611. In the embodiment illustrated in FIG. 6, the particular sample or symbol being considered by the fidelity processor 611 is that corresponding to the error power estimate found at the 4^(th) position in the 7 tap delay line 609 (and hence the 4 sample or symbol delay).

[0072] A decoder 619, such as, for example, a Reed-Solomon Decoder, decodes the samples or symbols with erasures, as determined by the fidelity processor 611. Many different types of algorithms may be used in the fidelity processor to generate fidelity metrics. Decoded data, an estimate of the transmitted signal for example, is outputted at output 621 of the receiver 610. It is contemplated that the functionality of processing block 617 may be part of the decoder 619. It is also contemplated that means other than as shown in, or specifically discussed with respect to, FIG. 6 may be used to calculate error power and to generate the fidelity metric. Further, quantities other than 7 may be used for the tap delay line.

[0073] In addition, while FIG. 6 illustrates a system having some components and functionality located outside of the receiver, it should be understood that such system may have additional components or functionality located within the receiver, or may in fact be entirely contained within the receiver. In addition, it should also be understood that the estimation of the error power and the processing depicted as being performed within the receiver of FIG. 6, may instead be performed outside of the receiver.

[0074]FIGS. 7A & 7B illustrate a flow diagram depicting a method that may be employed using the system of FIG. 6, in a digital communications embodiment of the present invention. A sequence of symbols is received as illustrated in block 701, and the closest constellation point to each symbol is determined as illustrated in block 703. The error power of each symbol is calculated, for example, using the square of the distance between the received symbol and the nearest constellation point in the digital system's signaling alphabet, as provided previously and as illustrated in block 705. Of course, other methods of calculating or estimating the error power of each symbol may be used.

[0075] Next, the error power of a sequence of symbols is captured as illustrated in block 707, and an average power of the captured sequence is calculated as illustrated in block 709. In addition, a maximum error power from a first portion of the captured sequence is determined as illustrated in block 711, and a maximum error power from a second portion of the sequence is likewise determined as illustrated in block 713.

[0076] The first and second portions of the sequence each include a common symbol that is the “middle” symbol of the whole sequence (i.e., the last symbol of the first portion and the first symbol of the second portion for example). In other words, for a sequence of length n, an odd number, the middle symbol may be defined by 1+(n−1)/2. It is this number that defines the symbol that is being considered as well as the symbol delay for decoding purposes. Again, as provided previously with respect to FIG. 6, the sequence length may be 7, which makes symbol 4 of the sequence the symbol that is being considered, and defines the decoder delay to be 4 symbols. It is contemplated that even numbers may be used for window length, too, and the symbol (or sample) under consideration need not be the one in the center of the window. The use of an odd window length and center symbol (sample) for which the channel fidelity is being estimated is provided only as an example.

[0077] The average error power of the sequence is then compared to a first threshold as illustrated in block 715. If the average is not above the first threshold, the common symbol is kept as illustrated in block 717, otherwise, the maximum error power of the first portion of the sequence is compared to a second threshold as illustrated in block 719. If that first maximum is not above the second threshold as illustrated in block 719, the common symbol is kept as illustrated in block 717, otherwise, the maximum error power of the second portion of the sequence is compared to the second threshold as illustrated in block 721. If that second maximum is not above the first threshold, the common symbol is kept; otherwise, the common symbol is erased. In any case, the decision of whether to erase or keep the common symbol is communicated to the decoder as illustrated in block 725. The process is then repeated, so that each symbol received is at some point considered (i.e., each received symbol is the common symbol for one iteration of the process).

[0078] For a 16 QAM constellation example having a constellation RMS power of 3.162 (i.e., the square root of 10) and, for example, a 7-symbol sequence, the first threshold may be 0, and the second threshold may be 0.64, for example. Of course, the second threshold may be set to 0, such that just the average error power of the whole sequence is used.

[0079] While the decisions made by blocks 715, 719 and 721 of FIGS. 7A-7B are shown to be in a particular sequence, any order of those decisions may be employed. In addition, those decisions may instead be performed simultaneously, rather than sequentially, as shown in FIGS. 8A-8B. Specifically, decision block 801 of FIG. 8A replaces the decision blocks 715, 719 and 721 of FIGS. 7A-7B. A single determination is made at block 801 of FIG. 8A, based on the three comparisons, whether the common symbol should be erased or kept.

[0080] Another specific example illustrating applying the channel fidelity metric to enhance the receiver processing follows with the summing of the error power over a sliding window. Especially with high density constellations, and with an impairment of low power or one such as gain compression, where the impairment likely does not cause the received, distorted signal to fall outside the normal signaling constellation, the fidelity processor may determine the presence of the impairment, but a significant fraction of the error power estimates may be rather small (since the received signal falls close to one of the many wrong symbols). In such instances, even using convolutional coding FEC and traditional Viterbi decoding, the branch metrics in the decoding process are not the most accurate reflection of the state of the channel fidelity when they are simply the error power estimates or log of error power estimates (for each symbol) from the slicer. Knowing that a degraded channel condition existed even when a signal was received “close” to a constellation point may be very beneficially used in the decoding, especially when “channel interleaving” is performed prior to the decoding, thus dispersing the impacted symbols.

[0081]FIG. 9 illustrates a flow diagram illustrating a method that uses a fidelity metric to modify branch metrics in the decoding process, in accordance with one embodiment of the present invention. First, a sequence of symbols is received as illustrated in block 901, error power estimates are estimated or determined as illustrated in block 903, and channel fidelity metrics are determined using the error power estimates as illustrated in block 905. This may be achieved using any means provided herein, for example. In addition, branch metrics are created as illustrated in block 907. For example, in a Viterbi decoder example, branch metrics are created for the Viterbi decoder branches. (Scaled logarithms of the error power are typically used). The Viterbi branches are normally inversely related to the error power from various constellation symbols, since the branch metrics represent the likelihood of the branch transition.

[0082] Once such branch metrics are created as illustrated in block 907, the branch metrics are modified based on the channel fidelity estimate as illustrated in block 909. For example, the branch metric may be set to a low probability value if the channel fidelity is determined to be poor. Finally, decoding (e.g., Viterbi) is performed using the modified branch metric as illustrated in block 911. This overall process may then be repeated.

[0083] As mentioned above, various embodiments of the present invention provide for a fidelity processor that examines a sliding window of error power estimates to yield a channel fidelity metric. While specific fidelity processing examples have been discussed above, still other types of fidelity processing may be employed in connection with the various embodiments of the present invention. For example, median filters or other ranking devices may be used. In a median filter, the middle ranked value within a window is output. Once again, as above, this value could be output “as is,” or quantized with various thresholds, perhaps into a single binary output.

[0084] Other forms of nonlinear filtering may also serve as useful fidelity processors. For example, the error power estimates may be quantized to a binary level with a threshold, i.e., “1” for greater than threshold and “0” for less than threshold, and these quantized samples filtered or averaged. This would simplify the “averaging” complexity, and a second threshold as described above may be applied to enhance the precision of marking the “turn on” and “turn off” of the severe impairments.

[0085] Still other types of fidelity processing may include, for example: (1) summing; (2) ranking; (3) thresholding and summing; (4) summing and twice thresholding (sum and individual points in the window); (5) quantizing the error power estimates or otherwise nonlinearly processing them (e.g., square root or log); (6) averaging across the window and taking the maximum of the average and (some factor multiplying) the middle error power estimate in the window; (7) taking the maximum of the median ranked value in the window and (some factor multiplying) the middle error power estimate in the window; (8) nonlinearly processing the error power estimates and averaging; and (9) quantizing the results from the aforementioned operations and/or nonlinearly processing them.

[0086] Furthermore, the channel fidelity metric may be used to analyze channel behavior. More specifically, the channel fidelity metric may be used to analyze for example duration and fraction of time of impaired conditions compared to unimpaired conditions, especially for determining most suitable FEC and symbol rates and constellation sizes, etc., for the dynamically varying channel. In addition, the channel fidelity metric may be applied to the receiver for beneficial use of processing signals received contemporaneously with the channel fidelity estimate. Some examples of using the channel fidelity metric to enhance receiver performance include: (1) marking Reed-Solomon symbols for erasure in a Reed-Solomon decoder capable of erasure and error correction decoding, and (2) in convolutional coded FEC (or other soft-decision decoders, such as Turbo decoding), affecting the soft-decision metric for a symbol with this additional channel fidelity metric.

[0087] This latter embodiment especially benefits from this technique if channel interleaving is performed on the symbol soft-decisions prior to the decoding. Various embodiments of the present invention are especially effective at enhancing receiver performance with severe impairment duration of multiple symbols, and with high density signaling constellations, as seen in these particular examples.

[0088] While the error power estimates provided previously above have been generated outside of the decoding process, decoding may be used to generate a potentially improved error power estimate. In other words, another method for generating the error power estimate includes actually performing a preliminary decoding (if FEC is employed), or partial decoding, and performing a better estimate of the transmitted waveform to more accurately estimate the error power. Such an approach means that there may be delays in the generation of the error power estimates, but often this is not a constraint. A second-pass at the decoding, now with the benefit of the channel fidelity metric (versus time) arising from the first-pass error power estimates, provides enhanced performance in the time-varying impairment scenario.

[0089]FIG. 10 illustrates a block diagram of an impairment mitigation system 1000 that uses preliminary decoding in generating error power estimates, in accordance with one embodiment of the present invention. The system 1000 may be contained, for example, in one or both of the communication nodes of FIG. 1. A receiver 1001 receives an input 1003, and performs normal hard and soft decisions. The information is then FEC decoded in FEC decoder 1005, and the information is then re-encoded and remodulated (for example by multiplying by the spreading signal for each of the symbols) by encoder 1007. The re-encoded information is then used along with the original input at 1003, to generate an error estimate as illustrated by reference numeral 1009, which in turn is used to calculate an error power estimate as illustrated by reference numeral 1011.

[0090] A fidelity processor 1013 uses the error power estimate to generate a channel fidelity metric, such as provided previously. FEC decoder 1015 uses the channel fidelity metric, along with the original, delayed input to decode the input, and output decoded data (i.e., an estimate of the transmitted signal) at output 1017. It is contemplated that the FEC decoder 1005 and FEC decoder 1015 may be separate units or devices, or combined into a single decoder.

[0091]FIG. 11 illustrates a flow diagram depicting one embodiment of a method of impairment mitigation that may be employed using the system of FIG. 10, for example. One or more symbols are received as illustrated by block 1101, are decoded as illustrated by block 1103 and then encoded and remodulated (for example by multiplying by the spreading signal for each of the symbols) as illustrated by block 1105. The error power of the received signal(s) is then estimated using the encoded symbol(s) as illustrated by block 1107. A channel fidelity metric is then determined using the error power estimate(s) as illustrated by block 1109, and the symbol(s) are decoded using the channel fidelity metric determined as illustrated by block 1111. If at block 1103 it is determined that particular received symbol(s) cannot be decoded and thus re-encoded, then those particular symbols are simply erased for estimation of error, for example.

[0092] As may be understood upon reviewing FIGS. 10 and 11, the system of FIG. 10 and method of FIG. 11 determine a fidelity metric after an initial decoding, and use it to perform a subsequent decoding. Multiple iterations of this process may be beneficial in some embodiments.

[0093] Based on the above, various embodiments of the present invention provide means for characterizing the transitory nature of the impairments (i.e., to develop knowledge) characterizing not just typical or even average levels of an impairment, but an understanding and characterization of the dynamic behavior of the impairment. With this knowledge, it is possible to facilitate improved communications in the channel, either by adjusting the transmission signal design, or by altering or adjusting the receiver processing, or both.

[0094] If the dynamic nature of the impairments is so rapid that it transitions from benign to severe and back to benign again, faster than the receiver can determine and communicate this degradation back to the original transmitter in the channel, then any adjustments in the transmission waveform are “permanent,” in the sense that adaptation to the temporarily degraded channel is precluded by the dynamics. Still, the optimal transmission waveform may be different if and when it is learned that the channel contains some severe but transitory impairment(s). Thus, it benefits the communications system to learn and characterize the transitory nature of the impairments, leading to a superior transmit waveform with this new knowledge.

[0095] While some situations may preclude the feedback and adjustment of the transmit waveform for adapting to a temporary increase of an impairment, in such situations, the receiver may still benefit from this knowledge.

[0096] The present invention also includes alternate embodiments for detecting impacted chips (symbols, waveforms, etc.). One embodiment of the present invention relates to some kind of distortion inducing mechanism (a duration of one up to several chips), which introduces a brief, temporary distortion during the operation of a communication system similar to that described previously. This embodiment uses 128 chips to send a multiplicity of symbols simultaneously during fraction of that frame. If the communication is subjected to a brief, temporary distortion, noise for example, the suspect (disturbed) chips are identified and blanked.

[0097] However, blanking the chip may affect the orthogonal spreading codes, such that they are no longer orthogonal. For example, if six chips are blanked out, then processing the remaining 120 of the 128 chips does not result in a zero value for the suspect chips unless the six blanked chips included three agreements and three disagreements (an unlikely occurrence). More likely, the remaining un-blanked chips contain some remnants of the suspect chips, resulting in a correlation between virtually all of the codes, which may result in ICI.

[0098]FIG. 12 illustrates a high level flow chart depicting a method for detecting impacted chips in accordance with one embodiment of the present invention. The illustrated method includes making a preliminary decision on at least one up to 128 chips, symbols or waveforms transmitted in one spreading frame as illustrated by block 1210. These chips are then remodulated, in one embodiment using spreading codes, as illustrated by block 1212. Then, a determination of the distortion or noise may be made at each chip position, between the remodulated waveform and the received waveform as illustrated by block 1214. One or more of the techniques provided previously may be applied to this distortion embodiment. In one embodiment, these techniques may be applied repeatedly. In other words, this process may be repeated for multiple iterations.

[0099]FIGS. 13A & 13B illustrate a detailed flow chart depicting an alternate method for detecting impacted signals (similar to that illustrated in FIG. 12) in accordance with one embodiment of the present invention. This method illustrated in FIG. 13 includes making a preliminary decision on each signal (for example, chips, symbols, waveforms, etc.) transmitted in at least one spreading frame as illustrated by block 1310. Such preliminary decisions may include blanking the suspect chips using burst noise detection as provided above or may include using raw received signal.

[0100] These signals are remodulated using spreading codes as illustrated by block 1312. Remodulating the signals may include putting the signals through a mass filter and taking the slicer outputs. A determination regarding the distortion or noise is made between the remodulated signal and the received signal regarding each signal as illustrated by block 1314. Such determination may include taking the missing signals, wiping them off and recreating them. Further, one or more of the techniques provided previously may be re-applied to such distortion estimate. This process may be repeated for multiple iterations. At the end of one or more passes or iterations, a set of signals (chips, symbols, waveforms, etc.) may be identified as containing or being suspected of containing elevated amounts of distortion and/or noise as illustrated by block 1316.

[0101] The illustrated method continues, blanking the samples that represent the identified suspect signals as illustrated by block 1318. In this embodiment blanking means are used to set the received signal to a value of zero for the identified suspect signals. The signals are correlated with the spreading code as illustrated by block 1320, providing an input to one or more slicers for each of the symbols in the spreading frame (128 symbols for example) as illustrated by block 1322. In one embodiment, these slicer inputs (alternatively referred to as “blanked slicer inputs”) may be corrupted due to the intercode interference or ICI introduced into the inputs by blanking the one or more signals. It is contemplated that the set of spreading codes are orthogonal (thus having zero ICI) only when at least one but up to all 128 signals are correlated.

[0102] A hard decision is made on each signal using at least one but up to 128 of the slicer inputs as illustrated by block 1324, even though such slicer inputs may contain ICI due to blanking. Such hard decisions are then used in a Partial Remodulator (alternatively referred to as “PRM”) wherein the composite transmitted value is reconstructed for each of the blanked signals, forming Partially Remodulated Energy (alternatively referred to as “PRME”) as illustrated by block 1326. In one embodiment, this assumes that such hard decisions are the actual transmitted signals. The PRME is correlated with the blanked positions or signals for each of the spreading codes, and at least one but up to 128 partial correlation results (alternatively referred to as “Partial Correlation Results” or “PRCs”) are added to the previously obtained blanked slicer inputs as illustrated by block 1328. This new set of at least one but up to 128 slicer inputs (alternatively referred to as “First Iteration Blanking-Repaired” or “1^(st) IBR” slicer inputs, is then “hard decisioned.” This blanking-repaired set of decisions may be used as the receiver hard decisions. However, in another embodiment the process may continue with at least one more iteration.

[0103] In a second iteration, the hard decisions from the 1^(st) IRB slicer inputs are used in the PRM and the resulting PRME is correlated with the blanked positions or signals. This set of at least one but up to 128 partial correlation results (alternatively referred to as “2^(nd) PRCs”) is added to the blanked slicer inputs. In one embodiment, the 2^(nd) PRCs are added to the original blanked slicer inputs. This addition results in at least one but up to 128 new slicer inputs (alternatively referred to as the “2^(nd) IBR slicer inputs”). These are 2^(nd) IBR slicer inputs are “hard decisioned.” These latest hard decisions may be the final hard decisions, or another iteration may be performed.

[0104] In subsequent iterations, the hard decisions from the Nth IBR slicer inputs are again passed to the PRM, and the resulting PRME is correlated with the blanked signals or chip positions, yielding N+1^(st) PRCs. In one embodiment, the N+1^(st) PRCs are added to the original blanked slicer inputs, producing N+1^(st) IBR slicer inputs. Such N+1^(st) IBR slicer inputs may again be “hard decisioned”. This blanking-repaired set of decisions may again be used as the receiver hard decisions.

[0105] The process may, in one embodiment, continue for a specific set of iterations (one or two iterations for example), or end when stability is reached. In one or more embodiments of the present invention, stability is defined as reaching the same hard decisions in two successive iterations, however other ending criteria are contemplated. It is also possible to execute one or more of the previously described iterations and use such hard decisions as feedback to a burst noise estimator (not shown). Such burst noise estimator may used to refine the estimate of which signals or chips were indeed impacted by increased distortion/noise. Then the iterative processing may start anew, with new blanked signals, chip positions or waveforms.

[0106] As provided previously, one embodiment of the present invention relates to a mitigation process using orthogonal decomposition of individual chips, signals, waveforms, etc. It is contemplated that this invention may be applicable to any set of orthogonal waveforms spanning the time-frequency signal space. In such an embodiments, the received waveform is decomposed into the various components of the new basis set. Any distorted or noisy dimensions are estimated (similar to that provided previously using a “dimension component” replacing the chips for example). These distorted/noisy dimensions are blanked, and the time-domain waveforms regenerated but without such distorted/noisy dimensions. The time-domain waveforms are correlated with each of the spreading codes, providing the blanked slicer inputs. The PRM takes the hard decisions using such blanked slicer inputs, computing the PRME needed to be reintroduced due to the elimination of some of the signal space dimensions. The iterations continue just as above, except in this embodiment the transfer from chip samples to the desired basis set and back again must be included in the processing.

[0107] Many modifications and variations of the present invention are possible in light of the above teachings. Thus, it is to be understood that, within the scope of the appended claims, the invention may be practiced otherwise than as described hereinabove. 

1. A method of impairment mitigation in a communications system comprising: making a preliminary decision on at least one signal; remodulating said at least one signal; and determining distortion of at least one signal using said at least one remodulated signal.
 2. The method of claim 1 wherein said symbol is any orthogonal signal.
 3. The method of claim 1 wherein said signal comprises one of at least one digital sample, at least one waveform, at least one chip or at least one symbol.
 4. The method of claim 1, wherein making said preliminary decision further comprises blanking at least one symbol.
 5. The method of claim 4, further comprising wiping off said blanked at least one symbol and recreating said at least one symbol.
 6. The method of claim 1, wherein remodulating said at least one symbol further comprises taking slicer outputs.
 7. The method of claim 6, wherein remodulating said at least one symbol further comprises using at least one mass filter to take said slicer outputs
 8. A method of mitigating impairment in communications signals, the method comprising: making a preliminary decision on each of said signals transmitted in at least one spreading frame; remodulating each of said signals using at least one spreading code; determining distortion between said remodulated signals and said signals; identifying at least one suspect signal using said distortion; blanking said at least one suspect signal; forming partially remodulated energy for said at least one blanked signal; reconstructing a composite transmitted value for said at least one blanked signal; and forming a partial correlation result.
 9. The method of claim 8, wherein remodulating each of said signals comprises passing said signals through a mass filter and taking slicer outputs.
 10. The method of claim 8, wherein blanking said identified suspect chips further comprises setting a value of said identified signals to zero.
 11. The method of claim 8, further comprising making a hard decision on each of said signals using at least one slicer input.
 12. The method of claim 8, further comprising reconstructing composite transmitted values for each of said blanked signals.
 13. The method of claim 8, further comprising using a partial remodulator to form partially remodulated energy using at least one hard decision.
 14. The method of claim 13, further comprising correlating said partial remodulated energy with said blanked signals.
 15. A method for mitigating impairment in a communication system, the method comprising: (a) receiving at least one symbol; (b) calculating error power of said symbol; and (c) determining whether to keep or erase said symbol using said error power.
 16. The method of claim 15, further comprising repeating steps (a) through (c).
 17. The method of claim 15, further comprising communicating said determination to keep or erase said symbol to a decoder.
 18. The method of claim 15, further comprising determining a closest constellation point to said symbol.
 19. The method of claim 15, wherein calculating said error power comprises determining a square of a distance between said symbol and a closest constellation point.
 20. The method of claim 15, wherein determining whether to keep or erase said symbol comprises comparing said error power to a predetermined threshold of error power.
 21. The method of claim 20, further comprising erasing said symbol if said error power is greater than said threshold of error power.
 22. The method of claim 21, further comprising keeping said symbol if said error power is less than said threshold of error power.
 23. A method for mitigating impairment in a communication system, the method comprising: (a) receiving symbols; (b) determining a closest constellation point to each of said symbols; (c) calculating a sum of error power for all said symbols using said closest constellation point; (d) keeping said symbols if said error power is less than a predetermined threshold of error power; and (e) erasing said symbol if said error power is greater than said threshold of error power.
 24. The method of claim 23, further comprising repeating steps (a) through (e) for each set of symbols received.
 25. A method for mitigating impairment in a communication system, the method comprising: (a) receiving a plurality of chips in a spreading interval; (b) calculating an error power for at least one of said chips; and (c) determining whether to keep or erase said chips using said error power.
 26. The method of claim 25, further comprising communicating said determination to keep or erase said chips to a decoder.
 27. The method of claim 25, further comprising repeating steps (a) through (c).
 28. The method of claim 25, further comprising determining a closest constellation point to said chip.
 29. The method of claim 25, further comprising calculating said error power using a remodulated set of hard decisions.
 30. The method of claim 25, wherein determining whether to keep or erase said chip comprises comparing said error power to a predetermined threshold of error power.
 31. The method of claim 30, further comprising erasing said chips if said error power is greater than said threshold of error power.
 32. The method of claim 30, further comprising keeping said chip if said error power is less than said threshold of error power.
 33. A method for mitigating impairment in a communication system, the method comprising: receiving a plurality of chips in a spreading interval; determining a closest constellation point to each of said chips; calculating an error power for each of said chips using said closest constellation point; keeping said chips if said error power is less than a predetermined threshold of error power; and erasing said chips if said error power is greater than said threshold of error power. 