824 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 37, NO.
8, AUGUST 1989
Code Division MultipleAccess Techniques in
Optical Fiber NetworksPart I:
Fundamental Principles
AbstractThis paper examines fiberoptic code division multiple
access (FOCDMA) communications techniques. A new class of codes
(signature sequences), namely, optical orthogonal codes (OOC’s), that ELECTRICAL ELECTRICAL
OR OPTICAL OR OPTICAL
are suitable for FOCDMA are introduced. An experiment that shows the
desired auto and crosscorrelation properties of these codes and their use
in FOCDMA is reported. Furthermore, the concept of optical disk
DATA
SOURCE
 OPXAL
ENCODER o c k ~
OPTICAL
CoRRELATOR  DATA
RECOVERY
TRANSMISS,ON (DECODER)
patterns, an equivalent way of representing OOC’s is introduced. The
~ MEDIUM
optical disk patterns are used to derive the probability density functions
associated with any two interfering OOC’s. Also presented is a detailed
study of different interference patterns from which the strongest and the
weakest interference patterns are introduced. Fig. 1 . A fiberoptic communication system using optical encoder and
decoder (correlator).
I. INTRODUCTION
T HE process of opticaltoelectrical and electricaltooptical
conversion in a fiberopticbased optical network for signal
processing limits how much fiber bandwidth can be used
because of the limited speed of electronic signal processors. It
is believed that optical components, once fully developed and
integrated, will offer much higher speeds for optical signal
processing than electronic counterparts [l], [2] , [3]. There
fore, a desirable feature of future optical communications
systems would be the ability to perform signal processing
functions optically so that the signal conversion from optical to
electrical would be done only when desired.
This paper investigates one such scheme, namely, fiber
+
I I
Fig. 2. A schematic diagram of an optical code division multipleaccess
optic code division multiple access. This scheme takes communication system with an alloptical encoder and decoder in a star
advantage of excess bandwidth in single mode fibers to map configuration.
low information rate electrical or optical signals into high rate
optical pulse sequences to achieve random, asynchronous data by the encoder at the j t h node. One of the primary goals
communications access, free of network control among many of FOCDMA is to extract data with the desired optical pulse
users. A typical FOCDMA communication system is best sequence in the presence of all other users’ optical pulse
represented by an information data source, followed by a laser sequences. We therefore need to design sequences that satisfy
when the information is in electrical signal form, and an two conditions [4][7], namely:
optical encoder that maps each bit of the output information C1) each sequence can easily be distinguished from a
into a very high rate optical sequence, that is then coupled into shifted version of itself and
the singlemode fiber channel (Fig. 1). At the receiver end of C2) each sequence can be easily distinguished from (a
the FOCDMA, the optical pulse sequence would be compared possibly shifted version of) every other sequence in the set.
to a stored replica of itself (correlation process) and to a In Section 11, a new class of sequences for fiber optic signal
threshold level at the comparator for the data recovery (Fig. processing, namely, the “optical orthogonal codes” that
1) satisfy the above two conditions is introduced. Section I11
In FOCDMA there are N such transmitter and receiver discusses a basic experiment demonstrating the principles of
pairs (users). Fig. 2 shows one such network in a star OOC’s and their use in FOCDMA. Section IV introduces the
configuration. The set of FOCDMA optical pulse sequences concept of optical disk patterns, an equivalent way of
essentially becomes a set of address codes or signature representing OOC’s. These optical disk patterns are used to
sequences for the network. To send information from user j to describe the probability density functions that are associated
user k, the address code for receiver k is impressed upon the with any two interfering OOC’s. Section V is devoted to the
study of OOC’s in a multipleaccess environment. References
[8], [9] are two other independent efforts for exploring fiber
Paper approved by the Editor for CATV of the IEEE Communications optic CDMA.
Society. Manuscript received January 15, 1988; revised March 24, 1989. This
paper ws presented in part at ICC’87, MILCOM’87, and the information II. OPTICALORTHOGONAL CODES (OOC’S)
Theory Symposium ’88.
The author is with Bell CommunicationsResearch, Morristown, NJ 07961
Central to any successful code division multipleaccess
1910. scheme, whether electrical or optical, is the choice of the high
IEEE Log Number 8929098. rate sequences, namely, the signature sequences, on which the
00906778/89/08000824$01 .OO 0 1989 IEEE
SALEHI: CDMA TECHNIQUESPART I: FUNDAMENTAL PRINCIPLES 825
information data bits of different users is mapped. In CDMA,
many asynchronous users occupy the same channel simultane
ously. A desired user’s receiver must be able to extract its
signature sequence in the presence of other user’s signature
sequences. Therefore, a set of signature sequences that are
distinguishable from time shifted versions of themselves and
for which any two such signature sequences are easily
distinguishable from (a possible timeshifted version of) each
other is needed. Let the two periodic signals x ( t ) and y ( t ) be 1 10 13 15
written as 0 Tc
l m
~(t)= x,,P~,(tnT,) (1)
TC n=m
and
1 
.~(t)=
TC
C a,
.YnPT,(tnTc) (2)
where PT,(t)is a unit rectangular pulse of duration T,. For 1 I I I I I I I 10I I 12I I I 15I I I ~ 20
I I I I I 25I I I I I3031
I 32
x(t) = x(t + T ) and y ( t ) = y ( t +
T ) for all t, then the 0 Tc
sequences (x,,) and ( y,,) are periodic sequences with period F
= T/T,. For some value of 7 such that for 0 5 7 IT and 7 (b)
= IT, where I is an integer that can take on any integer value Fig. 3. Two “optical orthogonal codes” with length F = 32, K = 4, and h,
= h, = 1. (a) First code is represented by placing a pulse at the Ist, loth,
between (0, F  l), the sequence design problem posed in
13th, and 28th chip positions. Here, we designate this code as 9, 3, 15, 5 .
conditions C1) and C2) in Section I reduces to constructing (b) Second code is represented by placing a pulse at the lst, Sth, 12th. and
sequences that satisfy the following two conditions. 31st chip positions; the code is designated as 4, 7, 19, 2.
1) For any sequence x = (x,,) in the set
The principles of OOC’s through the use of an example is
introduced. The result of this example will be used to
generalize and define new classes of codes. In this example,
two OOC’s, A and B, as in Fig. 3(a) and (b), with length 32
(3) and weight 4, i.e., F = 32 and K = 4, such that A, = A, = 1
2) For each pair of sequences x = (x,) and y = ( y , ) are constructed. Note that, in this example T, the time
associated with one bit of information, is divided into 32 equal
T, (chip times), i.e., F 4 T/T, = 32.
I
F 1
lZx,y(/)l
= xnyn+,SA, for O s l s F  1. (4) OOC A is represented by placing a chip waveform at the
1nO lst, loth, 13th, and 28th chip positions and OOC B is
represented by placing a chip waveform at the lst, 5th, 12th
Here K, A,, and A, are constants. Strict orthogonality would and 31st chip positions. The “fundamental rules” that ensure
require that A, = A, = 0. Here, a sequence is defined to be OOC’s A and B to have periodic autocorrelation peak (K ) and
orthogonal with respect to its shifted version if A, takes on its low periodic correlation (SA,) at any other time shifts, with
minimal value and two sequences are considered to be T, as the unit of time shift, can best be explained from a simple
orthogonal if A, takes on its minimal value. set theory. The two codes, A and B, are represented by their
The design of sequences with the above mentioned proper equivalent sets
ties for communications systems, such as spreadspectrum
code division multiple access, ranging systems, radar systems,
etc., has been a topic of interest to many communications
and
scientists and mathematicians in the last two decades [6].
Typical fiberoptic communications systems and fiber optic
signal processors today are modeled as positive systems [IO],
[ 111. A positive system is one that cannot manipulate its where 7: 4 the relative delay between the beginning of the
signals to add to zero. Therefore, codes or sequences that first pulse to the beginning of the second pulse and T:, 7 ; , 7:
satisfy the above two conditions based on + 1/  1 signals are the relative delays between the 2nd and 3rd, 3rd and 4th,
would not necessarily maintain those properties once consid 4th and 1st pulses of the periodic sequence [Fig. 3(a)].
ered for positive systems because the construction of these Similarly 77, 7;, 7!, and 74”are the relative delays, as defined
signals takes advantage of the ability to add the signals to zero. above, for code B [Fig. 3(b)].
Because fiberoptic signal processing today is equivalent to An extended set of set A , AEXT, with all linear combinations
power measurement (incoherent), and since power is nonnega of jointly connected relative delays of different lengths is
tive, such signals cannot be optically manipulated to add to constructed by the following.
zero with other induced optical power if coherent interference Step 1: Let the first 4, i.e., K, delay elements of the set AEXT
effects are eliminated. Hence, there is a need for a new class of be the delay elements of set A in (3, i.e., 7;’, T:, 7:’ 7:.
signature sequences that we call “optical orthogonal codes” Step 2: Let the next 4, i.e., K , delay elements of the set
for positive systems or specifically for FOCDMA. AEXT be the sum of all connected delay elements of size two,
In general, an ( F , K, A,, A,) optical orthogonal code C, is a i.e., 7;‘ + 7:, 7: + 4, 7: + 7:’ 7: + 7: for periodic
family of (0, 1) sequences of length F and weight K with auto sequence A. Note that the sum of disjoint delay elements +
and crosscorrelation constraints A, and A,. In this case, K is 7;’ and r t +
7: are not elements of the set A E X T because they
the number of 1’s in the sequence. From now on, consider can never occur independently.
ation is given to those families of OOC’s for which their auto Step (K  1): Let the (K  1)th (e.g., 3rd for this
and crosscorrelation constraints A, and A, are equal to one. example) group of K (e.g., 4 for this example) delay elements
826 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 31, NO. 8, AUGUST 1989
of the set A E X T be the sum of all connected delay elements of ponding extended sets, ALxTfor 1 5 i IN, have no repeated
size (K  I) [e.g., 3 for this example], i.e., 77 + 7; + T;, 7;’ elements and
+7;1 + 7:,7; + 7: + 7 f , 7: +7;4 + 7; for periodic
sequence A. (14)
The delay element of size four (K), 7:’ + 7; + 7;’ + 7; = where [ABXT[is the total number of elements in the ith
Tis not an element of the set A E X T Therefore,
. the set A E X T can extended set and
be written for this example as
A’,,, n ~i,,,=$ (15)
for all 1 5 i, j INand i # j. From (14) and (15) the value of
N is upper bounded by
It can be observed from (7) that the total number of elements
in the set A E X T , I A E X T I , is 12.
In general, for an (F,K, 1 , 1) OOC, the construction of its where the symbol LxJ denotes the integer portion of the real
extended set would have (K  1) steps with K elements in value x. Using the above fundamental rules for constructing
each step. Therefore, the total number of the elements in the families of OOC’s, there are many methodologies in their
extended set of an OOC, with A, = A, = 1, is K(K  1). design and analysis. In [I21 many different techniques (e.g.,
Similarly, one can construct the extended set of the periodic projective geometry, the greedy algorithm, iterative construc
sequence B, BEXT, as tions, algebraic coding theory, block design, and various
combinatorial techniques) for constructing families of OOC’s
have been extensively studied.
III. FOCDMA EXPERIMENT USING OFTICAL ORTHOGONAL
CODES
An experiment was carried out to demonstrate the principles
Note that I B E X T I = 12. of OOC’s and their use in FOCDMA. In this experiment, the
For the sequence or code A to satisfy the periodic output of each user’s data source was mapped into an OOC by
autocorrelation property, with A, = 1 , there can be no means of electronically programmable code generators (en
repeated delay elements in the set AEXT, i.e., no two or more coders). The outputs of the electronic encoders were used to
elements of the set AEXT can be equal. Similarly, for code B to modulate two semiconductor lasers and the output of each
satisfy the periodic autocorrelation property for A, = 1, there laser was coupled into a single mode fiber. The output of each
can be no repeated delay elements in the set BExT. single mode fiber was multiplexed into a common channel
It is desired to construct the two sequences, A and B, for (another single mode fiber) by a passive directional optical
which, in addition to their periodic autocorrelation property, coupler. The FOCDMA signal in the common channel can be
they satisfy the periodic crosscorrelation property of (4). For expressed as
example, to guarantee the periodic crosscorrelation property
for the two sequences, A and B, with equal length (F) and 2
equal weights (K) and A, = 1 , the intersection of their r ( t ) = C st(t7;)
extended sets must be empty, that is ‘= 1
where si(t  7 ; ) corresponds to the ith user’s signal, and 7i
where 4 denotes the empty set. represents the random time delay associated with the ith
From Fig. 3(a) and (b) signal. In this experiment, user number one is denoted as the
desired user. In FOCDMA a binary “1” is represented by
transmitting a sequence and a binary “0” is represented by
transmitting no sequence. The OOC’s A ’ = { 12, 22, 42, 52,
and 213) and B‘ = { 18, 26, 54, 70, 173) were used for the users
1 and 2. In this experiment, we used a fiber optic tappeddelay
B = ( 4 , 7, 19, 2). (1 1) line [13] (FOTDL) for code or sequence convolution. For a
Furthermore, from (7) and (8) given sequence, one can design a FOTDL with an impulse
response equivalent to the time reversal of the sequence. The
, 15, 5, 12, 18, 20, 14, 27, 23, 29, 17)
A ~ m = ( 9 3, (12) output of a FOTDL to its sequence is a realizable convolution
sum that has a maximum at the sequence frame time
and (correlation time). The output of the FOTDL is detected by a
& x T = ( ~ ,7, 19, 2, 1 1 , 26, 21, 6, 30, 28, 25, 13). (13) highspeed pin photodetector, amplified by series of wide
band amplifiers, and displayed on an oscilloscope. Fig. 4(a)
From (12) no element of the set AEXT is repeated twice or shows the response of a FOTDL when the sequence A ‘ is the
more. Similarly, from (13), no element of the set B E X T is input. The maximum value at the output of the FOTDL is 5 at
repeated twice or more. This condition guarantees that codes the correlation time and one or zero at any other time, i.e., it
A and B will satisfy the autocorrelation property for K = 4 obeys the autocorrelation property, (3), for K = 5 and A, =
and A,, = 1 . Furthermore, there is not a common element 1 . Fig. 4@), shows the output of a FOTDL designed for
between the two sets AEXTand B E ~ of T (12) and (13). sequence A ’ when sequence B ’ is an input. Here the output of
Therefore, A E X T n B E X T = 4. This condition guarantees the FOTDL takes on two values, namely, zero or one at all times,
crosscorrelation property between the two codes A and B for i.e., the crosscorrelation property, (4), for A, = 1 . Fig. 4(c) is
x, = 1 . the output of FOTDL when two sequences, A ’ and B‘, are
In general, for a given integer number F (code length) and present with a relative, random, time delay. It is clear that in
weight K where K(K  1) 5 F  1 and A, = A, = 1 , one the absence of quantum and thermal noise, the desired
can construct at most N OOC’s, A’, such that their corres sequence [in this case, sequence (A ‘)I can be extracted in the
SALEHI: CDMA TECHNIQUESPART I: FUNDAMENTAL PRINCIPLES 827
(C) (4
Fig. 4. The response of optical decoder to (a) OOC A , (b) OOC B, (c) sum
of the two OOC’s A and B ( A + B) with a relative, random, time shift with
respect to each other, and (d) over three bits of information. User 1
transmits the information bits 101 while user 2 transmits the information
bits 010.
presence of the other sequence ( B ’ ) with a threshold level,
Th, greater than one.
In FOCDMA with N users, an error occurs when the
desired user transmits a binary “0” that corresponds to
sending no sequence for onoff keying, and the interference
due to the other N  1 users’ signals (multiple access
interference) cause a false detection. If the total number of (b)
interfering signals, i.e., N  1, is less than the weight K of Fig. 5 . Alternate representation of the OOC A , (a) circular representation,
their corresponding OOC’s (with X, = l), then one can (b) optical disk pattern A .
choose a threshold level Th greater than N  1 so that the
error associated with the multiple access interference is zero.
For example, in the absence of quantum and thermal noise, if the ith mark to the beginning of the ( i + 1)th mark. To
Th > 1 and N = 2 and K = 5, an error free FOCDMA visualize the periodic auto and crosscorrelation properties of
system can be obtained. optical disk patterns, i.e., OOC’s, let a new disk, Fig. 5(b), be
In FOCDMA systems where the number of interfering the complement of the original disk of Fig. 5(a). Now, assume
users is greater than or equal to the weight K , i.e., N  1 2 that this disk is placed in a fixed position with a light source
K, then errors due to the interfering signals occur with some underneath to project the disk pattern on a surface. In fact, if
probability. For the error analysis of FOCDMA systems an exact replica of this disk is placed on top of the fixed
using OOC’s, which is the emphasis of Part II of this paper position disk with zero phase difference, the transparent
[ 141, the probability density functions associated with this sectors (marks) that correspond to the sequence would fall on
multipleaccess interference signal must be known. In Section top of each other and the actual pattern would still be projected
IV, the probability density function for the simple case of two on the projection surface, Fig. 6(a). This corresponds to the
interfering OOC’s with Xu = X, = 1 will be derived. This peak value of the autocorrelation function with K transparent
result will be used to evaluate the probability density function sectors overlap. As the upper disk rotates with some integer
for N  1 interfering OOC’s in FOCDMA systems [ 141. multiples of 8 with respect to the fixed lower disk, the number
of transparent sectors overlaps of the upper disk pattern with
I v . PROBABILITY DENSITY FUNCTION FOR TWO INTERFERING its lower replica disk is at most one for 8 # 2n7r rotation
OPTICALORTHOGONAL CODES where n = 0, 1, 2, 
, Fig. 6@). This is equivalent to the
To visualize the mathematical development of the probabil periodic autocorrelation property, (3), with K = 4 and Xu =
ity density function associated with any two interfering 1.
OOC’s, the concept of optical disk patterns is introduced. For The realtime OOC B [Fig. 3(b)] can be represented as the
example, the real time periodic OOC A , Fig. 3(a), can be optical disk pattern shown in Fig. 7. If disk B is rotated with
represented as the optical disk pattern shown in Fig. 5(a). respect to disk A , by any integer multiple of 8, then the
There is a oneto’ ne mapping of the real time periodic OOC’s maximum number of projected marks on the projection
to optical disk patterns. From Figs. 3(a) and 5(a), the time surface would be one (Fig. 8). This is equivalent to the
associated with one bit of information, i.e., T seconds, periodic crosscorrelation function, (4), with A, = 1. The
corresponds to the perimeter of the disk, and each chip time elements of the sets A , B, A E X Tand
, BEXTof (5), (6), (7), and
(T,) corresponds to a sector such that 2 d 8 = T / T , = F (8) can be, equivalently, represented by their corresponding
where 8 is the phase associated with each sector of the disk. relative phase elements. Because of their equivalence, the
There is a direct correlation between the relative delays probability density function associated with two interfering
between the positions of the pulses in the time domain and the periodic OOC’s (e.g., A and B ) is equivalent to the probability
relative phases between the marked sectors. That is 7:’ + CY? density function associated with their corresponding interfer
for 1 Ii IK where CY! the angle between the beginning of ing optical disk patterns. For example, if one rotates disk B
828 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 31, NO. 8, AUGUST 1989
4 f t!
Fig. 7. Optical disk pattern B.
d v(a)
Fig. 8. Demonstrating the crosscorrelation value between optical disk
patterns A and B (A, = 1).
take place. Furthermore, with K marks of disk B, there would
be a total of K2 possible overlaps. The probability of each
individual overlap is equal to 1/F, since the random phase
rotation is uniformly distributed between (0,27rI. With integer
multiples of 8 as the random phase shift and with K2possible
positions, the probability of an overlap would be K2/F. The
complement of this event, which corresponds to the probabil
ity of no overlap, is 1  K2/F. Therefore, one can define for
these events, a random variable w with a probability density
function P,(w) expressed as
(b)
Fig. 6. Demonstrating the autocorrelation value of optical disk pattern A,
(a) peak value (K), (b) autocorrelation value with some shifts (A, = 1).
with respect to disk A , with some random integer multiples of
P,(w)=
(z)
1 
K2
&(w)+ 6 ( w  1)
F
(18)
where 6 denotes Dirac’s delta function. The mean and the
8, then the probability that a mark of disk B would exactly variance for the above random variable w are M , = K2/Fand
overlap a mark of disk A (each with K marks and F sectors) u’, = (K2/F)(1  K 2 / F ) , respectively. Note that the
would be K2/F. This is true because for each mark of disk B, probability density function P , ( w ) of (18) corresponds to the
there are K possible marks of disk A where the overlaps could probability density function of two interfering OOC’s (e.g., A
SALEHI: CDMA TECHNIQUESPART I: FUNDAMENTAL PRINCIPLES 829
and B) with shifts that are integer multiples of T,. This is the adjacent. But, in a typical family of periodic OOC’s, some
case of chip synchronous interference between two OOC’s. codes would have their pulses adjacent with the pulses of some
To consider the case of onoff modulation of the sequence other codes, some codes would have no adjacent pulses with
representing data transmission, a new random variable u = the pulses of some other codes, and some codes would have
dw is introduced where w is defined as a random variable with only few of their pulses adjacent with the pulses of some other
a probability density function defined as in (18) and where d is codes. In any case, a complete and exact knowledge for
a random variable that takes on values 1 or 0 with equal different values of u f .in a family of OOC’s with N codes could
probability and corresponds to the state of the light source require the knowledge of N ( N  1)/2 probability density
itself whether it is on or off. Since the expected value of d is functions. It is clear that for large N , the above task is lengthy
1 /2, the probability density function P , (U)for random variable and tedious. But (22) indicates that the variance of chip
u becomes synchronous interference, ut, is approximately equal to the
variance of two OOC’s where their pulses are completely
K2
( );:
Pu(u)= 1  6(u)+ 6 ( u  1)
2F
adjacent with respect to each other. The variance ut corres
(19) ponds to the variance of two OOC’s for which there is no
adjacent pulse with respect to each other. One can argue that
where its mean and variance are equal to Mu = K2/2F and ut the chip synchronous interference U is a pessimistic approxi
= (K2/2F)(1  K2/2F), respectively. Note that this case mation to the actual interference and the ideal chip asynchron
corresponds to the chip synchronous interference between two ous interference U is an optimistic approximation to the actual
OOC’s for which one is modulated by an onoff keying. interference vij, for all 1 5 i, j 5 Nand i # j [see Section VI.
A less constrained event U ’ can be defined when the phase For mathematical convenience, the probability density
shifts are not integer multiples of 8 as in the case U. Here, the functions associated with the chip synchronous, (19), and ideal
probability density function associated with the random chip asynchronous, (21), will be used as the basis for
variable U ’ for the two particular optical disk patterns as in evaluating the probability density function for N  1
Figs. 5(b) and 7 can be shown to be by the methods that are interfering OOC’s in [14].
described in Section V as
v. NOTESON INTERFERING OPTICAL ORTHOGONAL CODES
5 1 1  In this section some quantitative arguments on the proba
P v . ( u ’ ) = S ( u ‘ ) +  S ( u ’  l)+ IuI bility density functions associated with two chip synchronous
8 8 4
and ideal chip asynchronous interfering OOC’s and their use
where 1 4 is a unit rectangular pulse for 0 < x < 1 and zero in evaluating the upper and lower bounds on the probability of
elsewhere. The mean M u / = 0.25 and the variance ut, = error per bit are presented.
0.146. The above random variable U ’ corresponds to the The approach taken to prove that the chip synchronous and
interference of the two OOC’s A and B with time shifts that ideal chip asynchronous interferences are the pessimistic and
can take on any value between (0,T), i.e., chip asynchronous optimistic approximations to the actual interference is by
interference. constructing a family of OOC’s and showing that the above
Note that U ’ in the above case can take on the value 1 with a two cases are the extreme cases between any two interfering
probability 1/8. This interference effect between two ObC’s OOC’s in that family (generalization to any other family
occurs when some of their corresponding pulses are adjacent follows). The easiest family of OOC’s to construct systemati
with respect to each other. If KZ/F 5 1/2, then two OOC’s cally, the family with length F (chips) and A, = A, = 1 and K
can be constructed that have no adjacent pulses with respect to = 2, will be selected. For the above families of OOC’s, the
each other and therefore their corresponding probability number of elements in their extended set is 2 and they are
density function, Pv(u),can be expressed as [see Section VJ represented as
(z)
Pv(u)= 1 S(u)+
K2
F
14
where U is the same as U ’ , except that it corresponds to the
(F1,l), (F2, 2), . e * ,
where C i denotes the family of OOC’s, and Ai = (F  i, i ) ,
mutual interference of two OOC’s for which no pulse of one for 1 5 i 5 F/2  1 , denotes the ith code with K = 2 and A,
code is adjacent to a pulse of the other code (no pulse = A, = 1 and, for which F L 2 is an even integer, and 1 Cil
adjacencies). The mean and variance for random variable U are 
= F/2  1 where 1 I denotes the number (size) of OOC’s in
equal to Mu = K2/2F and u t  = (Kz/F)(1/3  K2/4F), the above families.
respectively. If K = 4 and F = 32, thenM, = M u , = Mu = For example, for F = 16 then
0.25 and ut < ut, < ut where ut = 0.104, ut, = 0.146, ut
= 0.187. Ci={(15,11, (14,2), (13, 31, (12, 4),
In general, in a family of OOC’s of size N with length F and
weight K where K2/F I 1/2 and A, = A, = 1, then [see (11, 51, (10,61, (9, 7)) (24)
Section VI where ICil = 7.
For evaluating the probability density functions among
some OOC’s, four OOC’s from (24) were first chosen, i.e.,
Ai = (15, l), Az = (14, 2), A3 = (13, 3), andA7 = (9, 7)
where U; corresponds to the variance of interfering ith and [see Fig. 91. Next, one code was chosen (e.g., A * ) , as a
jth, uij, OOC’s for all 1 5 i , j 5 N and i # j. In a reference code. Now, circular convolutions between the
communications system the variance of an interference or reference code Az with the other remaining three codes were
noise signal is the measure of its strength, i.e., the larger the done, i.e., Az @ A , , A 2 @ A 3 ,Az @ A7 where @ denotes
variance the stronger the interference, and it is desired to the circular convolution operation. The result of the above
minimize or reduce this interference strength, i.e., variance. circular convolutions are shown in Fig. lO(a)(c). Note that in
Therefore, from (22), one can deduce that the best designed these figures, the output of the circular convolutions do not
families of OOC’s are those that do not have any adjacent exceed 1. This indicates that when a family of OOC’s are
pulses with respect to each other and the worst designed designed for a maximum of one overlap, i.e., A, = 1, no
families are those for which all their corresponding pulses are matter how any two of them are positioned with respect to
830 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 31, NO. 8, AUGUST 1989
projection surface is 2/16 since only 2 chip intervals in Fig.
10(a) are either linearly increasing or linearly decrea sing.
Therefore, the probability density function for the two
interfering OOC’s A I and A2 can be expressed as
where Z21 denotes the random variable associated witlI! the
(a) (b)

above interfering OOC’s and
1 O<x<l
0 elsewhere *
(26)
Similarly, one can express the probability density functions
for the other two cases from Fig. lo@) and (c) as
9 1 6
P123(123)=8(123)+~(123l)+ (27)
16 16 16
and
(C) (d)
Fig. 9. Four members of a family of OOC with length F = 16, and weight
K = 2.
where Z2, and 1 2 7 denote the random variables associated with
the interfering OOC’s A2 and A 3 ,A2, and A 7 , respectively.
The assumption for chip synchronous interference is equiva
lent to Fig. 10(d) where 4, i.e., K 2 ,chip intervals have a value
of one and the remaining 12, i.e., F  K 2 ,chip intervals have
) 11 ,2 13 14 15 ,6 a value of zero. The probability density function associated
with this case is expressed as
(a)
0
, A2 MA3
PICS(1CS) = ( z)
1  WCS)
K2
+
F wcs
where ICs denotes the random variable associated to chip
1) (29)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
synchronous interference. If F = 16 and K = 2 then E (121)
(b) = E ( 1 2 3 ) = E ( 1 2 7 ) = E ( 1 ~=~0.25,
) where E denotes the
, &@A, ensemble average. Furthermore, the variances for the above
random variables are u;27 = 0.104, u:23 = 0.143, U& =
1 0.167, = 0.1875. It is observed that
‘ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 42,< ai23 <4 2 , <4cs. (30)
Since a variance of a random variable (interference) is the
measure of its strength, then from (30) one can argue that the
t interference pattern created by interfering the two OOC’s A2
and A 7 , is the weakest interfering pattern. This “weakest”
effect between the two interfering OOC’s A 2and A7 is because
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 of the relative positions of their respective pulses (marks). If
(d) the relative delays between the positions of their pulses are
Fig. 10. Interference patterns due to OOC’s (a) A2 and A,, (b)A 2 and A,, sufficiently large, then when a pulse of one code begins to
(c) A2 and A,, (d) equivalent to chip synchronous interference pattern. overlap (meet) with a pulse of the other code, and if the
overlapping (meeting) is continued for a duration of twice the
each other, the total area (the total area of the projected marks chip time, then, within this duration, no other pulses at any
on a projection surface) of their overlapped pulses (maximum other positions would overlap (meet) with each other. Further
of two simultaneous partial overlaps) would not exceed one more, there is no other pulse within these intervals of
(the chip overlap area has been normalized to unity). Further overlaps. The above properties must be true for any pair of
more, Fig. 10(a)(c) show all possible ways of combining pulses of the codes A 2 and A 7 . Therefore, OOC’s with the
(interfering) codes, A2 with A I ,A2 with A3, and A2 with A7. above properties create the weakest effect when they interfere
For example, Fig. 10(a) indicates that if one repeats the with each other.
experiment of rotating the two optical disk patterns (with the On the other hand, if two OOC’s have their pulses
light source being on with probability one) associated with positioned so that when a pulse of one code begins to overlap
codes A I and A 2 then the probability that one sees no (zero) (meet) with a pulse of another code, the overlapping (meeting)
projected area on the projection surface is 11/ 16 since 11 chip continues uniformly among all the other pulses for a duration
intervals of Fig. 10(a) have a value of zero. The probability of K 2  1 chip intervals. These classes of OOC’s create the
that one sees a total area of 1 on the projection surface is 3/16 strongest interfering patterns [see Fig. 10(a)]. In fact, chip
since 3 chip intervals in Fig. 10(a) have a value of one. The synchronous interference, Fig. 10(d), which is considered
probability that one sees any area between 0 and 1 on the only for its mathematical convenience, indicates an even
SALEHI: CDMA TECHNIQUESPART I: FUNDAMENTAL PRINCIPLES 83 1
stronger interference with respect to the strongest interference interfering OOC’s, I,,, with a mean MI = p = K Z / Fand a
pattern in a family of OOC’s. Any other interference pattern variance ufCs = pq = (K2/F)(1  K % / F ) .The variance,
would have a variance between these extremes (weakest and p q , has a maximum value, 0.25, at p = q = 1/2, and this
strongest) cases. For example, Fig. lo@) shows the interfer maximum value occurs when F = 2 K 2 . For example, if K =
ence pattern between the two codes and A 2 and A3. 2, then F = 8 and the three OOC’s that form a family are { (7,
There are two cases for the above interference pattern (Z23). l), ( 6 , 2 ) , (5, 3 ) ) . If K = 3, then F = 18 and the two OOC’s
One case is when a pulse of one code begins to overlap (meet) that form a family are ( ( 1 , 2 , 15), (4, 6 , 8 ) ) . And if K = 4,
with a pulse of another code, then during this overlapping then F = 32 and the two OOC’s that form a family are the
(meeting) period, i.e., two chip time, other pulses at other OOC’s A and B discussed in Section II. In fact it is easy to
positions could begin to meet, or there is another pulse within show that for K > 2 a n d p = q = 1 / 2 , the maximum number
these two chip intervals. The other case is when a pulse of one of OOC’s in a family is limited by 2.
code begins to overlap (meet) with a pulse of the other code, If the values o f p , such that 0 < p < 1/2 or 1/2 < q < 1
then during this overlapping period no other pulses at any andp + q = 1,thenK2 < F/2.1fK2 4 F/2, i.e.,p 4 112,
other positions would overlap with each other, and, further then many large size families of OOC’s can be constructed.
more there is no other pulse during these two chip intervals. For example, if F = loo0 and K = 5, thenp = 0.025 and N
Note that these kinds of interference patterns (effects) are
mixtures of weakest and strongest interference patterns. To
I49. Therefore, for a FOCDMA with many users, (N *
2 ) , one must choose p , such that p = K 2 / F 4 112.
judge which effect is a more dominant effect would depend on For all those values of p , such that 1/2 < p < 1 , the
which two OOC’s are interfering, and usually requires an availability of families of OOC’s diminishes. In fact, if p =
exact knowledge of the actual interference patterns. K 2 / F = (F  1)/F < 1 then N IK / ( K  1). If K = 2 ,
Generally, there are N ( N  1)/2 possible, distinct, then N = 2 and if K > 2 then N < 2. Since a family of
interference patterns in a family of OOC’s with N codes. For OOC’s must contain at least two OOC’s, it is clear that for K
K > 2 , the exact calculations for all the interference patterns, > 2, one cannot construct any family of OOC’s. The smallest
i.e., the probability density functions, are somewhat lengthy. family exists for K = 2 , N = 2, and F = 5. Here, p = 0.8
But one can bound the effects, i.e., variances, (upper and and q = 0.2, u:cs = 0.16 and the two OOC’s are ((4, l ) , ( 2 ,
lower) of these intermediate interference patterns by their
extreme cases. It remains to be seen that for a given family of 3 ) ) (see Fig. 11). Therefore, it can be concluded that for p =
OOC’s with size N , length F, weight K, and A, = h, = 1 , the K 2 / F 2 0.8 or K 2 2 0.8F, one cannot construct any family
variances of the intermediate interference patterns are indeed of OOC’s other than with K = 2 , N = 2 , and F = 5. Note
bounded by the weakest and the strongest interference patterns that for any values o f p such that 0.8F < p < 1 and p + q =
in that family. In fact, one can define a generalized interfer 1 , one can construct at most one OOC with A, = 1.
ence pattern with a probability density function expressed as B. Strong Chip Asynchronous Interference Pattern
P M = 4 W ) +PWZ 1) + (1 P  4)17 The probability density function for the strongest chip
(31)
asynchronous interference pattern Is in a family of OOC’s
with length F , weight K , and A, = h, = 1 , is expressed as
where I is a random variable associated with the above
generalized interference pattern, and
q k Pr (Z=O) (3W
and
p Pr (Z= 1) (31b)
+ (K$) 2
6(Zs l ) + F IZsl. (32)
and From (31e) and (32), q = 1  ( K 2 + l ) / F ,p = ( K 2  1)/F
and 1  p  q = 2 / F . The above random variable Is with a
1 pq A Pr (O<Z< 1) (31c) probability density function defined as in (32)has a mean MI,
where p + q 5 1. Furthermore, the mean MI and the = K 2 / Fand a variance u : ~= (K2/F)(1  K 2 / F )  1/3F.
variance U: for the above random variable I are equal to Note that the variance for the strong chip asynchronous pattern
is always less than the variance of its corresponding chip
synchronous interference pattern, i.e., u ~ by~an ~ amount
: of
1/3F. For large values of F, the above difference becomes
negligible. The largest value for 1/3F where there exists a
and family of OOC’s, occurs if F = 5, K = 2, and N = 2. If F =
5, then 1/3F = 0.0667, p = 0.6, q = 0 , and 2 / F = 0.4.
+q (:!) + y + p (!!)
6 4
+1 .
12
This family of OOC’s was shown to be the smallest existing
(31e) family. Therefore, mathematically, one can bound the above
differences in variances between any strong chip asynchronous
The above probability density function, (31),is of interest only patterns and their corresponding chip synchronous patterns by
for those values of p and q for which there exists a family of
OOC’s. For example, for p = 1 , a family of OOC’s does not 0 s U& U fs(0.0667. (33)
exist. Therefore, the values of p and q for the three cases of C. Weak Chip Asynchronous Interference Pattern (Ideal
chip synchronous, strong interference chip asynchronous, and Chip Asynchronous Interference)
the weak interference chip asynchronous (ideal chip asyn
chronous) for which there exists at least one family of OOC’s The probability density function for an ideal chip asyn
(a family of OOC’s must contain at least two OOC’s, i.e., N chronous interference pattern Z, in a family of OOC’s with
2 2 ) will be determined. length F, weight K, and ha = A, = 1 is expressed as
A. Chip Synchronous (An Idealized Case) P,w(zw)= q W w ) + (1  4 ) l  a . (34)
For all those values of p and q such that p + q = 1 , (31 ) The random variable I, has a mean MI, = 1  q / 2 = K 2 / F
reduces to the probability density function of chip synchronous and a variance u2 = ( 1  q ) ( 1 / 3  ( 1  q ) / 4 ) = 2 K 2 /
Iw
832 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 37, NO. 8, AUGUST 1989
/
/
REGION 2 1
25
0 093
0 083
c
N
REGION 3
(b)
Fig. 11. The smallest size family of OOC’s (F = 5 , K = 2, N = 2).
F(1/3  K 2 / 2 F ) . Equation (34) is true for all those values of
q such that whenever p = 0 then 0 < 2 K 2 / F 5 1. This
implies mathematically that weak interference patterns could
exist only in those families of OOC’s such that K 2 / F 5 1/2.
In those families of OOC’s where K 2 Q F/2, there are many
weak interference patterns. It can be shown that
1 .O
(35) (b)
Fig. 12. Variances of generalized interference patterns due to optical
orthogonal codes.
and
12(a) and (b) show the two dimensional variations of (31e)
from different positions. Fig. 12(a) shows the value of (31e),
i.e., a:, from the back and Fig. 12(b) shows it from the side.
Equations (35) and (36) show the difference between the In both figures, there are three regions, i.e., Regions 1, 2, and
variances of weak interference patterns with respect to their 3. Region 1 is for those values of p for which there are no
chip synchronous and strong chip asynchronous interference families of OOC’s (see Sections VA and B). Region 2 is for
patterns, respectively. those values o f p where one can make the smallest size, i.e., 2,
The maximum values for (35) and (36) are achieved families of OOC’s with no weak interference pattern effect.
mathematically when K2/F = 112 for (35) and (36).Then (35) Region 3, which is of interest for multiple access, is for those
and (36) can be shown to be bounded by values of p where there are large size families of OOC’s with
weak interference pattern effect. Fig. 12(b) shows Region 3
0 S ~;~~~;~<0.167 (37) close up. The dashed line that starts from the beginning of
Region 2 all the way down to Region 3 where q = 1.0,
and corresponds to the variance of those interference patterns with
the values of p and q such that p + q = 1, i.e., chip
0 S ~;,~;~<0.167 synchronous. Note that this dashed line has a maximum value
a t p = q = 1/2 for which a: = 0.25. The solid line that starts
From (35) and (36), one can show that
a t p = q = 0 and ends at q = 1.O corresponds to the variance
of those interference patterns for which their probability
(39) density function is defined as in (31e) with p = 0 and q = 1
 2K2/F, i.e., the weak chip asynchronous interference
One can think of the strong chip asynchronous interference patterns.
pattern as a special case of generalized interference pattern Thelinethatstartsatp = q = O a n d e n d s a t p = q = 1/2
with 1  p  q = 2/F. Therefore, (39) indicates that the corresponds to the variances of those interference patterns that
variance of a generalized interference pattern is bounded by its have equal mean, i.e., 1/2 for this particular line, regardless of
corresponding chip synchronous and weak chip asynchronous what form of interference patterns they are, i.e., chip
(ideal chip asynchronous) pattern. To show that the above synchronous, strong chip asynchronous, weak chip asynchron
claim is true for all possible forms of generalized interference ous, and all possible intermediate asynchronous patterns. Fig.
patterns, i.e., for all values of 1  p  q 2 2 / F such that p 12(a) shows more of these lines for different values of q . Note
+ q < 1, (31e) has been plotted in Fig. 12(a) and (b). Fig. that in a family of OOC’s with length F , weight K , and size N
SALEHI: CDMA TECHNIQUESPART I: FUNDAMENTAL PRINCIPLES 833
B 2, any interference pattern between any two members of D. V. Sarwate and M. B. Pursley, “Crosscorrelation properties of
that family would have a mean equal to K 2 / F . Therefore, pseudorandom and related sequences,” Proc. IEEE, vol. 68, pp. 593
from Fig. 12(a) and (b) one can see that the two cases of chip 619, May 1980.
synchronous and weak chip asynchronous (ideal chip asyn P. A. Davis and A. A. Shaar, “Asynchronous multiplexing for an
chronous) are the pessimistic and optimistic approximations of opticalfiberlocal area network,” Electron. Lett., vol. 19, no. 10, pp.
390392, May 1983.
a given general interference pattern of a family of OOC’s with J. Y. Hui, “Pattern code modulation and optical decodingA novel
mean equal to K 2 / F . codedivision multiplexing technique for multifiber network,” IEEE J.
Select. Areas Commun., vol. SAC3, pp. 916927, 1985.
VI. CONCLUSION P. R. Prucnal, M. A. Santoro, and T. R. Fan, “Spread spectrum fiber
In this paper, fiberoptic code division multiple access was optic local area network using optical processing,” IEEE J.
examined, a technique in which low information data rates are Lightwave Technol., vol. LT4, p. 547, 1986.
mapped into very high rate address codes (signature se B. Moslehi, J. W. Goodman,M. Tur, and H. J. Shaw, “Fiberoptic
quences) for the purpose of achieving random, asynchronous lattice signal processing,” Special Issue on Optical Computing, Proc.
communications free of network control, among many users. IEEE, pp. 909930, July 1984.
K.P.Jackson, S. A. Newton, B. Moslehi, M. Tur, C. C. Cutler, J. W.
Specifically discussed was the need for a special class of Goodman, and H. J. Shaw, “Optical fiber delayline signal process
signature sequences that can achieve the above multipleaccess ing,” IEEE Trans. Microwave Theory Tech., vol. MTT33, pp.
capability using fiberoptic signal processing techniques. A 193210, Mar. 1985.
new class of signature sequences, which are called “optical F. R. K. Chung, J. A. Salehi, and V. K. Wei, “Optical orthogonal
orthogonal codes” was introduced, for which they satisfy codes: Design, analysis, and applications,” IEEE Trans. Inform.
auto and crosscorrelation properties required for FOCDMA. Theory, vol. 37, May 1989.
These newly invented codes were used in an experiment to E. Marom, “Optical delay line matched filters,” IEEE Trans.
show the principles of FOCDMA. In this experiment we Circuits Syst., vol. CAS25, pp. 360364, June 1978.
demonstrated the auto and crosscorrelation properties of this J. A. Salehi and C. A. Brackett, “Code division multipleaccess
new class of codes. Furthermore, optical disk patterns were techniques in optical fiber networksPart 11: Systems performance
analysis,” IEEE Trans. Commun., see this issue, pp. 834842.
introduced; the equivalent way of representing optical ortho
gonal codes, and were used to demonstrate the properties of
interfering optical orthogonal codes. Described also was an
experiment in which the probability density functions for any
*
two interfering OOC’s were developed.
Jawad A. Salehi (M’80M’84) was born in Kaze
ACKNOWLEDGMENT main, Iraq, on December 22, 1956. He received the
B.S. degree in electrical engineering from Univer
The author wishes to thank C. A. Brackett and S . S . Cheng sity of California, Irvine, in 1979, and the M.S. and
for their support and encouragement of this research. Thanks Ph.D. degrees in electrical engineering from Uni
are also extended to F. R. K. Chung, V. K. Wei, M. G. versity of Southern California in 1980 and 1984,
O’Conner, and M. Kerner for helping to design and analyze respectively.
the optical orthogonal codes. From 1981 to 1984, he was a fulltime research
assistant at Communications Sciences Institute at
REFERENCES U.S.C. engaged in research in the area of spread
[I1 Special Issue on Optical Multiaccesss Networks, IEEE Network spectrum code division multipleaccess (CDMA)
Mag., vol. 3, Mar. 1989. networks. Since 1984 he has been a Member of Technical Staff in the Applied
P I P. W. Smith, “On the role of photonic switching in future communica Research Area at Bell Communications Research (Bellcore), Morristown, NJ.
tions systems,” in Proc. IEEE Int. Conf., Commun.. June 1987, pp. His current research interests are in the areas of communication theory,
1570 1574. optical signal processing techniques for optical networks, in particular, fiber
r31 Special Issue on Optical Computing, Proc. IEEE, July 1984. optic CDMA and ultrashort light pulse CDMA, optical sequences, and optical
r41 C. L. Weber, G . K. Huth, and B. H. Batson, “Performance neuromorphic networks.
considerations of code division multipleaccess systems,” IEEE Dr. Salehi is a member of Optical Society of America and he is a recipient
Trans. Veh. Technol., vol. VT30, pp. 310, Feb. 1981. of the Bellcore’s Award of Excellence. He helped, as a member of organizing
r51 M. B. Pursley , SpreadSpectrumMultipleAccess Communications committee, to organize the first and the second IEEE conference on “Neural
in MultiUser CommunicationSystems, G . Longo, Ed. New York: Information Processing SystemsNaturaland Synthetic” November 1987 and
SpringerVerlag, 1981, pp. 139199. 1988, Denver, CO.