Академический Документы
Профессиональный Документы
Культура Документы
582
O-7803-1927-3/94/$4.00 @ 1994 IEEE
I V
w(t) = u ( t ) +j .v ( t ) , (3)
HIT MLSS
u(t) = A z ( t ) P N ( t ) nr(t),+
+
~ ( t )= A y ( t ) P N ( t ) r c y ( t ) , 111. ON-OFFKEYING ASSISTED DS/SS ACQ~JISITION
and z ( t ) = g(t)cos[+(t) +e], y(t) = g(t)sin[d(t) B ] are two + SYSTEM
independent zero mean Gaussian processes that represent
fading; while n r ( t ) and n ~ ( t are
) the equivalent low-pass In the On-Off Keying Assisted DS/SS Acquisition Sys-
AWGN. For typical mobile radio channel, both z ( t ) and y(l) tem, we vary the power in the preamble section following an
have an autocorrelation function of on-off pattern. The power varying capability is necessary in
any (:DMA system to overcome the near-far problem, thus
p(T) = I ( t ) .I(t + T) = y(t). Y(t + T) = U;.Jo(2XfDT), (4) this scheme appears to impose no additional hardware re-
quirements. For simplicity, lets assume that the length of a
where Jo(.) is the zero order Bessel function and as men- single on state equals one PN sequence length. Figure 3
tioned before, fo is the doppler frequency. On the other shows an overall view of the new acquisition system, assum-
hand, the power spectral density of the low-pass AWGN, ing a correlator length of one PN sequence. Since an on-off
n r ( t ) and tiy(t), are both N O . scheme is adopted, we can double the power during the on
When the local PN sequence is in synchronization with state, while still maintaining the same average power as in
the transmitted one, the output of the energy detector, E l , other schemes. Depending on the false alarm rate needed
follows an exponential distribution (calculated from the blocking probability), we set different
thresholds for the on and off periods, say TI and so re-
P(El)= T
1
C
-2, (5)
spectively. For the receiver, who does not know whether
the current pulse sent is on or o f f , keeps on tracking
2ai
threshold T I in the first place. Once the first threshold is
where U: = Au~T+ N O T . When the transmitted and local detected, the algorithm continuously looks or alternate TO
PN waveforms are not in synchronization, or when there is and T I until either acquisition is reached or the search being
no signal present, the received signal energy is again expo- terminated as the number of state transitions exceeds the
nentially distributed preamble length L (explained in later sections). Figure 4
shows the search strategy used. T h e TI or TO in each node
indicates the current threshold in each state. A HIT r e p
resents correlator output exceeding the threshold, while the
MISS is the opposite. Note that a MISS (not a HIT) will
cause a transition from state 2 to state 3 because falling be-
with U: = N O T . From the pdf in equation (6), we can select
low the threshold means a high probability for the presence
appropriate thresholds for a given false alarm rate, which in
of noise.
turn is determined by the desired blocking probability, Pb.
In the above model, we do not account for power control Intuitively speaking, the benefits of this method are three-
which is possible to eliminate some fading effect. Perfect fold: first, a higher power in the on state increases its resis-
power control can maintain the received signal at a constant tance to Rayleigh fading; second, the uoff state which now
SNR and the channel is reduced to a AWGN channel. In consists of only AW(:N, is not subject to any fading; third,
real situations, however, non-ideal power control will result we gam an extra degree of freedom in setting the threshold
in performance in between an AWGN and a fading chan- for the off state - since only noise is present, we can set
nel. Although not presented in this paper, simulations on a the threshold as high as desired so that the probability of
AWGN channel also prove the on-off schemes superior per- going from state 2 to state 3 (ref. Figure 4) is very high,
formance to others. approaching more towards acquisition state 4.
...
Fig. 5 . On-Off Keying
line. In this way, each value in the array represents one cor-
relator output, with the leftmost being the most recent one. Fig. 8. FLAKE Receiver Algorithm
T h e processor unit is responsible for summing up values in
the memory array according to the particular RAKE receiver
algorithm designed.
A. R A K E Receiver Algorithm
Assume that the received signal consists of several path
components. The correlator output will become high the
first time when the signal from the shortest path arrives, 051 I
0 100 200 300 400 So0 600 700 800
which is shifted into the first memory location. The receiver Samples
algorithm works in two stages as follows, see figure 8: i.) Fig. 9. Partial Correlation.
the processing unit continuously nionitors the value shifted
into the first memory location. When this value exceeds a
particular threshold, ~ ~ ~ ( a lower
~ threshold
l , set~ for , ~ ~ ~ ~
difficulty.
only one tap output), enough additional correlator outputs
are collected (more samples collected) until the value origi- I). Windowing Technique
nally in the first location has been shifted to the end loca-
tion. Now, the memory array will contain all the different Let us denote the RAKE receiver output as a sequence
path components with the first ray located a t the rightmost of [. . . , 0 - 2 , 0 - , , 0 0 , 0 1 , 0 2 , . . .] in which 00corresponds to
memory location, provided that the memory length ,is longer the correct acquisition. Suppose ~ ~ is crossed ~at ~ l
than the delay spread. ii.) T h e processing unit then selects index -2 and 0-, is also larger than r. Instead of treating -2
the largest five from the array, s u m them up and test the as the correct acquisition, we will look forward the outputs
value against another threshold which is set according to the [O-,+, , . . . , 0-,+~] and see if any of them is greater than 0-,.
scheme (on-off, coincidence ...) and the particular blocking If 01;is the largest value in the window that satisfies ( O k >
probability required. Passing both stages makes declaration 0-,,-i+ 1 5 k 5 z + l ) , and the single correlator output a t
of presence of signal. If the second stage is not passed, we index k is greater than rprellmtnaryr k will be treated as the
scan backwards from the last location to check if any exceeds correct acquisition.
~ ~ ~ and repeat
~ l the ,second
~ stage , if necessary.
~ ~ If~ no ~ T h e underlying working principle is as follows: The
~ ~ crossing may ~ be due~ to noise ori partial corre- , ~ ~
such value exists, the algorithm restarts again in checking the
first location continuously. T h e purpose of the first stage is lation. In the former case, 0-, will be unlikely greater than
T , while in the latter case, the first ray will be within one
to for aligning the first ray to the last memory location, so
that the RAKE receiver covers the whole delay spread, while symbol. As long as the value 1 is large enough, the window
the second stage does the actual threshold testing. will cover the actual acquisition position and the correspond-
ing RAKE output will be the largest because it sums up all
C. Problem of Partaal (:orrelation with PN Sequence the rays. Due to the finite length of the tap-delay line, the
For energy detection, we are faced with an abrupt change value of 1 is restricted to (1 symbol - tap-delay line) in
other methods, but (2 symbols - tap-lelay line) in the on-
from nothing to having a signal. Before the first symbol
(first P N code) has been shifted entirely into the correlator, off scheme (this is possible because the next symbol is noise
only). A larger 1 will imply higher chance of covering the
we have partial overlap between the incoming and the locally
generated PN sequence - partial correlation. Figure 9 shows actual acquisition and thus making the on-off scheme more
effective in using the windowing technique.
the correlator output for a train of bits 1 received which have
passed through a two-ray channel without any noise. We VI. SIMLJLATION
RESULTSON FREQUENCY
SELECTIVE
can see that in a period of 1 symbol (bit) before the first FADINGCHANNEL
match (high output), some additional noise caused by the
partial correlation is found, which can be as high as 15% of In our simulation studies, we use a two-ray frequency se-
the signal strength. This temporary increase in noise occurs lective Rayleigh fading channel [Ill. Three directions are
within one symbol (bit) before the first ray and may cause studied: 1 . ) various SNR, 2.) preamble length, and 3.)
the RAKE receiver to align incorrectly. In o u r experiments, different distribution among the two rays. Parameters are
we introduce a simple wiudowing technique to overcome this same as used in the flat fading channel and the two paths
585
smi
~SrrbS- ..-Cain&W b a I 0.-011
Fig. 10. Simulation Results for: Pb = L = 5, Q u a l Power Fig. 12. Simulation Results for: pb = L = 5, Varying Power
Distribution. Distribution.
.. .......... ... ..... ..... CDMA packet radio system. T h e method involves overlaying
On-Off keying in the preamble section. Simulation results
... have shown that this method outperforms the other existing
0.4 ones, both in a flat fading and a frequency selective fading
channel. In the latter caae, we propose a particular RAKE
receiver algorithm to overcome the multipath effect and also
5 6 7 8 9 10 I1 I2 13 14 I5 a windowing technique to eliminate partial correlation prob-
-w lem.
REFERENCES
[l] W. C. Y. Lee, Overview of Cellular CDMA, IEEE Trans-
aciions on Vehicular Tcchnologg, Vol. 40,No.2, May 1991.
[2] A. Polydoros, C. L. Weber, A Ullified Approach to Se-
-
rial Search Spread-Spectrum Code Acquisition Part 11: A
5 6 7 8 9 10 I1 I2 13 14 15
MatQed-Filter Receiver, IEEE hnractions on Commu-
-Lml*
nications, Vol. COM-32, pp.550-560, May 1984.
=9 . r s h s w _-_c&mwa ... [koLI [3] E. Sourour,S. C. Gupta, Diuect-Sequence Spread Spectrum
Parallel Acquisition hi Nouselective and Fkequeucy-Selective
Fig. 11. Simulation Results for: f i = IO-, Equal Power Distribu- Hjcian F&g Channels, IEEE Trowactions on Communi-
tion. cations, Vol. 10, pp.535-544, April 1992.
[4] P. M. Hopkins, A llnified Analysis of Pseudonoise Synchro-
uization by Envelop Correlation, IEEE Transactions on
are separated by 6ps. Communicationr, Vol. COM-25, pp.770-778, August 1977.
Figure 10 shows the simulation results where only the SNR [5] S. M. Pau, D. E. Dodds, S. K u a r , Acquisition Time Dis-
is changed. T h e preamble is fixed a t 5 and the power is tribution for Spread-Spectrum Receivers, IEEE Journal on
distributed equally among two rays. As one expects, the Selecied Areas in Communications, Vol. 8 , pp.800-807, Juue
trend is increase in thronghput with increasing SNR. 1990.
In the second study, m fix the SNR, while varying the [6] J. K. Holmes, C. C. Cheu, Acquisition Time Perforniaice
of PN Spread-Spectrum Systems, IEEE Tmnaactions on
preamble length. Figure 11 shows simulation results for Communications, Vol. COM-25, August 1977.
two SNR vdaes, 15dB and 20 dB. Generally speaking, the [7] Y. T. Su, Rapid Code Acquisition Algoritluns Employhg
throughput increases with increasing preamble length. PN Matched Filters, IEEE Transactions on Communica-
At last, in figure 12, we perform simulations where we vary tions, vo1.36, June 1988.
the distribution of energy among the two paths. [SI L. B. Milstein, J. Gevargiz, P. K. Das, Hapid Acquisition
Results show that the on-& scheme outperforms the oth- for Direct Sequence Spread-Spectrum Couuuunicatiolls Us-
ers in all situations. Compare with the flat fading chan- iiig Parallel SAW Convolvers,IEEE Transactions on Com-
nel, we discover t h a t the RAKE receiver can achieve simi- munications, Vol. COM-33, July 1985.
lar throughput, given the s a n e SNR. This implies t h a t the [9] P. F. Driessee, Z. L. Shi, A New Rapid Acquisition Scheme
RAKE receiver has actually performed its job of frequency For Burst Mode DS Spread Spectnuu Packet Radio, MIL-
COM 91 Proceedings, pp. 809-813.
selectivity and combining energy from all paths.
[lo] Z. L. Shi,P. F. Driessen, Automatic Tlueshold Control For
Acquisition in Spread Spectrum Packet W O Coiiuuullica-
V I I. CONCLUSIONS tiou, ICC 93 Proceedings, pp. 478-402.
Synchronization in DS/SS communications is very impor- [ll] T. Chan, P. Ho, Bit-Error Probability of Uncoded QPSK
tant because it is the process necessary in priori before any Trausiuitted Over a 2-Hay Frequency Selective Haylei& Fad-
d a t a demodulation possible. In this paper, we have pro- ing Chauiel, ICC 92 Proceedings, Vol. 1, pp.311-315.
posed a new method for the acquisition procedure in DS/SS