Академический Документы
Профессиональный Документы
Культура Документы
Networks
3
Multiple Access and Duplexing
Multiple access and duplexing
Multiple access: cell-wide frequency sharing
Duplexing: system-wide frequency sharing
Duplexing techniques
FDD: frequency division duplexing
TDD: time division duplexing
4
5
Multiple Access Overview - A Party
!
Consider a number of students at a party.The goal of
the students is to have intelligible conversation.The
house at which the party is being held is the resource
available.
FDMA : Each pair of students has a separate room to
talk
TDMA : Everyone is in the same room and each pair
has a limited time slot to converse
CDMA : Everyone is in the same room,talking at the
same time,but each pair talks in a different language.
6
7
8
Why CDMA?
Multiple Access scheme
High Capacity: More users: Power Control
Improvement when fewer users are using the system: In FDMA and TDMA
unused frequency and time slot are a waste of resource.
Better performance in a multi-path fading environment
Soft Handoff: Universal Frequency Reuse (Even have softer handoff)
9
Spread-Spectrum Motivation
Originally developed and used for military communications.
To provide resistance to intentional jamming. (i.e., anti-
jamming protection)
To hide the signal by transmitting it at low power and thus
making it difficult for an unintended listener to detect its
presence in noise. (i.e., low probability to intercept)
Basic Requirements
Transmission bandwidth >> Minimum bandwidth
required to transmit the information.
The spreading signal is independent of the
information data.
At the receiver, the synchronized replica of the
spreading signal is used for despreading.
Spread-Spectrum System
Despread signal :
g (t ) n (t ) c (t )
Baseband Signal Wideband spread noise
Only the receiver knowing c(t) can recover the data g(t).
(b) Low Probability of Detection (or
Intercept)
Therefore,
The spread-spectrum signal be made difficult to jam.
The signals very existence may be rendered difficult to
perceive.
(c) Multiple Access
DBM DBM
FM RF x FM
Exciter x Amp/Filter
Preamp Receiver
Audio Audio
PN Code PN Code Synchro
Generator Generator Oscillator
Receiver Transmitter
35
Two Stage of Modulation
24
25
Walsh Functions (Orthogonal codeword set): Using the
Hadamard matrix
0 0 0 0 | 0 0 0 0
0 1 0 1 | 0 1 0 1
0 0 1 1 | 0 0 1 1
0 1 1 0 | 0 1 1 0
H 3
0 0 0 0 | 1 1 1 1
0 1 0 1 | 1 0 1 0
0 0 1 1 | 1 1 0 0
0 1 1 0 | 1 0 0 1
27
28
29
30
31
32
DS-CDMA: User 1
S1
0
-1
0 10 20 30 40 50 60 70
1
Code1
-1
0 10 20 30 40 50 60 70
1
S1*Code1
-1
0 10 20 30 40 50 60 70
Recovered S1
-1
0 10 20 30 40 50 60 70
DS-CDMA: User 2
S2 0
-1
0 10 20 30 40 50 60 70
1
Code2
-1
0 10 20 30 40 50 60 70
1
S2*Code2
-1
0 10 20 30 40 50 60 70
DS-CDMA: User 3
S3 0
-1
0 10 20 30 40 50 60 70
1
Code3
-1
0 10 20 30 40 50 60 70
1
S3*Code3
-1
0 10 20 30 40 50 60 70
Transmitted (received signal)
2
Transmitted Signal (Received Signal)
-1
-2
-3
0 10 20 30 40 50 60 70
Recovered Signal
R1 0
-5
0 10 20 30 40 50 60 70
5
R2
-5
0 10 20 30 40 50 60 70
5
R3
-5
0 10 20 30 40 50 60 70
Walsh Codes Example
Assignment
Assume four Users are generating 1, -1, -1 and 1 (g(t))
as shown in the Fig. Assign four different Orthogonal
Wash codes (c(t)) to each user. Each Walsh code should
have eight chips. Spread each user generated bit with a
unique Walsh code. Add them and send on the channel.
Receive the transmitted CDMA signal and de-spread
and integrate over the bit period for each user.
Implementation in Matlab
(b) Frequency-Hopping
Spread-Spectrum (FH-
SS)
PN sequences
1 NT c
K
2
where c ( t ) dt
0
NT c
Characteristics
1) Spreading
2) Can be programmed to avoid portions of spectrum
3) Complex frequency synthesize
4) Not useful for range
3) Hopping Synchronization
Applications (1)
Multipath Suppression
g(t) A cos t
~
Output of correlator s(t) = AA x(t - td)
~
g(t - td) Correlator
Coding is one of the most fascinating aspects of the
study of spread spectrum.
Spread spectrum codes must act as noise-like (random)
but must be deterministic.
A very important feature in SS systems is that of the
imbedded reference concept for demodulation the
original message.
That is, the code used by the transmitter must be
replicated perfectly in the receiver.
For this reason, true randomness cannot be used by SS
systems because random cannot be replicated.
Inversion Modulation
When digital information is combined with a PN
waveform, each data bit level 1 inverts the code
and each data bit level 0 does not invert the
code, but leaves it unaffected.
This is called inversion modulation and is by
far the most common means for combining code
with data.
Data A
1 0 1 1 0 1 0 0
Locally generated
PN bit stream B 1 0 01 0 11 01 0 0 1 0 1 00 1 0 10 11 00 1 0 11 0 11 0
A xor B
transmitted C 0 1 1 0 0 11 0 0 11 0 1 01 1 1 0 1 0 0 01 1 1 01 1 011 0
Received C
same as above 0 1 1 0 0 11 0 0 11 0 1 01 1 1 0 1 0 0 01 1 1 01 1 011 0
Locally generated
PN bit stream D
same as B above 1 0 01 0 11 01 0 0 1 0 1 00 1 0 10 11 00 1 0 11 0 11 0
C xor D original
data signal 1 0 1 1 0 1 0 0
Observe that the number of chips (code bits) per
data bits is the processing gain.
There are other ways in which code and data can be
combined in a DS system, but we will address those
techniques later.
The properties, structure, and generation of these
codes is extremely important in determining the
performance properties of the system.
Codes can influence the following properties in a
system.
Security / Privacy
Multiple Access
Synchronization
Detectability
There is an important distinction between security
and privacy. A code that is not secure can still be
used in a secure system by encrypting the data
Important Code Properties
Must be easily generated at the
transmitter and receiver (i.e.
deterministic)
Behave as much as possible like a
random sequence
Be difficult to exploit
Support multiple access
Provide ease of synchronization
PN Code Generators
The most common means to generate PN code
sequences is with a Linear Feedback Shift
Register (LFSR).
Also called a Linear Recursive Sequence (LRS).
Also called PN Sequence.
Simple Shift Register Generator (SSRG)
+ Mod-2 Adder
PN sequence
a1 a2 a3 a4 . . . . an
C k -1 C k -2 C k -3 C k -4 . . . . C k -n
5-Stage Simple Shift Register
Generator
1 2 3 4 5
x0 x1 x2 x3 x4 x5
c lo c k
n = 5 ; number of register stages
N = length of sequence generated only if
correct taps are chosen (maximal length)
This generator is described by a polynomial
over a field of two symbols, ones and zeros,
called Galois Field of 2 (GF2).
The generator g(x) is written:
m
g (x)
i
gix
i0
Maximal Length Sequences
When the sequence goes through all 2 1
n
possible
states, we say that the generator is of maximal length,
i.e. N is maximum, and it is called an m-sequence.
The periodic cycles of a linear SSRG sequence depend
on:
Register length
Feedback taps
Initial conditions
Only if feedback taps are properly chosen will the
sequence be an m-sequence.
A non-maximal sequence is one in which the register
does not go through all possible states, i.e. the
sequence will be initial fill dependent.
Properties of m-sequences
1) m-sequences must have an even number of
taps.
4. Balance Property
In one period of an m-sequence, there is one
more 1 and 0 (result of not having an all zeros
state).
RUN PROPERTIES OF M-SEQUENCES
In one period there a 2(n-1) runs of consecutive 1s
or 0s.
are of length 1
are of length 2
1/2l are of length l
Or equivalently:
1 run of 1s of length n
1 run of 0s of length n-1
1 run of 1s and 1 run of 0s of length n-2
2 runs of 1s and 2 runs of 0s of length n-3
4 runs of 1s and 4 runs of 0s of length n-4
2n-3 runs of 1s and 2n-3 runs of 0s of length. 1
61
Auto-correlation
A very important property of m-sequences is the
periodic auto-correlation property.
Autocorrelation is defined as:
R XX [m ] X [n]X [n m ]
n
1/N
59
Partial Correlation
Because the important random properties of m-
sequences are the result of usually very long
sequences, it is not possible to perform full
length correlation in the receiver.
Also, if the duration of a message bit is less than
the period of the PN sequence, then in order to
decode the message we need to correlate over
something less than a full code period.
In these cases, the correlation function does not
apply
The Partial Correlation function is written:
cm (k ) 1 / M am amk
m 1
Crosscorrelation
73
74
75
CDMA2000 Specifications
Data Rate: Variable but with repetition and error correction the symbol rate is
19.2 ksps
Chip Rate: 1.2288 Mcps
Spreading of 64 times the symbol rate.
Bandwidth Required: 1.25 MHz (Times 2)
76
77
78
MATLAB Code
% MATLAB code for simulating the spreading using Walsh codes-----------------------
-------
clear all
close all
A=[-1 -1 1 1];
B=[-1 1 1 1] ;
C=[1 1 -1 -1];
codeA=[];
codeB=[];
codeC=[]; 79
MATLAB Code
for k=1:length(cA) contd.
codeA=[codeA cA(k)*Tc_samp];
codeB=[codeB cB(k)*Tc_samp];
codeC=[codeC cC(k)*Tc_samp];
end
%Generation of Tx Data
Tx_data=[];
for k=1:length(A)
uA=A(k)*codeA;
uB=B(k)*codeB;
uC=C(k)*codeC;
Tx_data=[Tx_data uA+uB+uC];
end
NN=length(Tx_data);
80
MATLAB Code
uAb=[];
contd.
uBb=[];
uCb=[];
for k=1:NN/16
index=(k-1)*NN/4+1:k*NN/4;
uAb=[uAb sum(Tx_data(index).*codeA)];
uBb=[uBb sum(Tx_data(index).*codeB)];
uCb=[uCb sum(Tx_data(index).*codeC)];
end
%Error
A-uAb/16;B-uBb/16;C-uCb/16
81
Conclusion