Академический Документы
Профессиональный Документы
Культура Документы
Reference: Introduction to Spread Spectrum Communications: Peterson, Ziemer, and Borth, Prentice Hall, 1995 [0-02-431623-7]
• Spread Spectrum technology was originally developed for military, single user, anti-jam applications
where the intent was to conceal the signal being communicated in the presence of a jammer [a signal
that is intended to make communications unreliable]. Spread spectrum works by spreading the
energy of a narrow-band source signal (eg, 10 kHz speech) over a wide bandwidth (eg, 1-10 mHz).
The spread spectrum modulated signals are broadband, noise like, and resistant to multipath (since
they are broadband). Invented by the female American actress Heddy Lamar during World War II
[she actually invented FH/SS ---see below].
• Current major application of spread spectrum is to the multiple user environment in2G (IS-95) and
3G cellular communications. For a single cell: CDMA-based IS-95 and TDM-based GSM/IS-136
have the same theoretical capacity [in a given bandwidth (B Hz) and time duration (T sec)--- ie, 2BT
orthogonal carriers are possible].
• Spread Spectrum is a (controlled) interference-limited system
– Carriers are chosen to be “random” waveforms with regard to each other
– Each user/carrier is assigned a unique randomized code, different and approximately orthogonal (ie, low cross-
correlation) to the other codes [analogous to having unique time slot in TDMA or unique frequency in FDMA]
– Correlation (CDMA) and frequency agile (Frequency Hopping Spread Spectrum ---FH/SS) receivers are used
to separate the users
– Users can transmit asynchronously with respect to each other (performance is better if synchronized)
• In Code Division Multiple Access or CDMA (specially with Direct Sequence Multiple Access):
– In addition to being rejected by correlation , the residual interference is averaged over a long time (CDMA is
said to be a noise-averaging system)
– the code is a pseudo-noise (PN) like, high bit-rate signal that is used to multiply the user information symbols.
– the capacity of a system is not subject to a hard limit (like TDMA); increasing the number of users reduces the
received signal-to-interference ratio and performance
– technical issue: power control (for maximum system capacity, all users must be received at ~ same power)
• In Frequency Hopped Spread Spectrum (FH/SS) the code is used to generate a pattern of frequency
hops (signal typically stays on a frequency for a small number of bits) that avoids other users
– FH/SS is a noise-avoidance system
1
Multiple Access System Fundamentals
• Popular Multiple Access Alternatives [for Wireless Systems]
– Frequency Division Multiple Access (FDMA): First-generation analog systems
– Time Division Multiple Access (TDMA)
– Spread Spectrum Multiple Access
• Code Division Multiple Access (CDMA) [also called Direct Sequence (DS)
Spread Spectrum]
• Frequency Hopped Spread Spectrum (FH/SS) ---this is what Heddy Lamar
invented
– Time Division Duplex (TDD)
• Two classes of multiple access
– Contending for rf resources (eg, time slot, code, or frequency) using an
“ALOHA”-like protocol like that used on packet networks. This is a multipoint
(many terminals) to point (the base station) network
– Sharing circuit resource (frequency, time, or code) with other users on a point-to-
point basis between the mobile terminal and the base station (this is where the
FDMA, TDMA, and CDMA technologies apply --- once the circuit has been
established.)
• Third-generation (3G) systems will be data/packet oriented and will use “ALOHA” like
protocols to send info in a (controlled) asynchronous mode
• Two basic approaches to resource sharing
– Orthogonal systems (ideally non-interfering): TDMA, FDMA, TDD
– Controlled Interference: Spread Spectrum
2
DIGITAL RADIO TRANSMISSION: Multiple Access Radio Systems
[For sharing the “rf” spectrum among multiple users]
1 A/D and . *. .
Speech Coder
2 A/D and . *. .
Speech Coder
Multiplexer Modulator
..
.
N A/D and . *. .
Speech Coder
Downlink
Frequency path
Uplink
path
Time
Frequency
Uplink Downlink
path path
Time 5
Code Division Multiple Access: Spread Spectrum Techniques
Code Division Multiple Access (CDMA) is based on the principle that each subscriber is assigned a
unique code that can be used by the system to distinguish that user from all other users transmitting
simultaneously over the same frequency band. There are several techniques that have been considered
for mobile radio CDMA communications, including:
6
Code Division Multiple Access: Spread Spectrum Techniques
7
Spread Spectrum Classification
Spread spectrum is the general term describing a communication system in which:
1. the information is transmitted with a wider bandwidth (at RF) then the information bandwidth.
2. the RF bandwidth is independent of the information bandwidth.
Three types of spread spectrum methods are: frequency-hopping (FH) spread spectrum, time-hopping (TH) spread
spectrum, and direct sequence (DS) spread spectrum.
In a frequency-hopping system the signal frequency is constant for a specified time duration, referred to as a time chip,
Tc. It is frequently convenient to categorize frequency-hopping systems as either “fast-hop” or “slow-hop,” since there is
a considerable difference in performance for these two types of systems. A fast-hop system is usually considered to be
one in which the frequency-hopping takes place at a rate that is greater than the message bit rate. In a slow-hop system,
the hop rate is less than the message bit rate. There is, of course, an intermediate situation in which the hop rate and the
message bit rate are of the same order of magnitude. In a time-hopping system the transmission time is divided into
intervals known as frames. Each frame is divided into M time slots. During each frame one and only one time slot will be
modulated with a message. All of the message bits accumulated in the previous frame are transmitted in a burst during
the selected time slot.
The direct sequence (DS) (or pseudo noise—PN) is an averaging type system where the reduction of interference takes
place because the interference can be averaged over a large time interval. The frequency-hopping (FH) and time-hopping
(TH) systems are avoidance systems. Here, the reduction in interference occurs because the signal is made to avoid the
interference a large fraction of the time.
A list of the advantages and disadvantages of the three types of systems is shown.
8
CDMA Direct Sequence Transmitter
b(t)
Digital Signal (Bits) Multiplier
Source and
RF
Channel X
Modulator
Coding Frequency
b(t)c(t)
Spectrum
f
Code Bits (Chips) “Spread” Frequency f
Code Spectrum
Generator
c(t)
– The information signal, b(t) [with symbol rate 1/T], is multiplied by a unique, high-rate
digital spreading code, c(t), that has many [~100] zero crossings per symbol/bit interval
[with Tc sec between symbols]
– The Spreading Code, c(t), is periodic with a period of T sec. [the source symbol period]
– Bandwidth spread by code bits (called Chips) before transmission
– The transmitted signal, b(t)c(t) is wideband and has the bandwidth of the spreading code
– At the transmitter (eg, a cellular Base Station), Multiple Signals are combined onto one
radio frequency channel
– In IS-95: Only transmit rf bits when there is active speech
9
CDMA Direct Sequence Receiver
b(t)
Digital Signal (Bits)
Multiplier
b(t)c(t) Channel
RF
X and
Demodulator
De-Spread Source
“Spread” Frequency f Signal Decoding
Spectrum
f
Code Bits (Chips)
Code
Generator c(t)
Recovered Signal
Other
Users
G { G = processing gain
= number of chips per information bit
WHEN CODES ARE NOT TIME SYNCHRONIZED
f (more later)
10
narrowband First zero crossing ~ 1/Tb
c i(t) wideband
First zero crossing ~ 1/Tc
CDMA PRINCIPLE:
Spread Spectrum Concept
• PN code generator output signal: ci(t), with Tc , where Tc is known as the chip time.
T
G= b, typically Tc << Tb [eg, Tb = 64 Tc ],
Tc
• The processing gain is central to system performance when codes from different
sources/users are not time synchronized.
• Spectrum of b(t) is GB(f), [narrowband], and the spectra of c i(t), and y(t), which are
Gc(f), and Gy(f) respectively, are wideband where Gy (f) ≅ Gc(f)
• We say that GB(f), the spectrum of b(t), has been spread to a wider bandwidth.
11
DIRECT SEQUENCE CODE GENERATOR: (Pseudo-Noise Sequence)
... m output
1 2 outouoOutp
b i(t)
Clock
-1
• The correlation function is only nonzero when the pulses p(t-mTc) and
p(t+t -nTc) overlap. The delay t can be expressed as t = kTc + å , where
0 < å < Tc. Using this substitution, the pulses only overlap only for n = k+m
and n = k+m+1, so that the correlation function becomes
M −1 Tc −ε
1 1
Rc (τ ) = Rc (k , ε ) =
M
∑ a a
m k +m
Tc ∫ p( λ ) p( λ + ε ) dλ
m=0 0
T
1 M −1 1 c
+ ∑ am ak + m +1 ∫ p(λ ) p(λ − Tc + ε ) dλ
M m=0 Tc Tc −ε
1 M −1
1 1 M −1 ε
=
M
∑
m=0
a a
m k +m
Tc
(Tc − ε ) + ∑ m k +m+1 T
M m =0
a a
c
14
Correlation Function of the Code Sequence-3
• The operation of the shift register can be described in terms of a z-Transform [many
references use the term D-Transform]. As a polynomial in “z,” the transfer function of
the shift register is generally a primitive polynomial---a primitive polynomial is one that
cannot be factored [see Chapter 6] for more information. Using this framework it can be
shown that the mod-2 sum of the output of the shift register and any phase shifted signal
is the same signal at a different phase [i.e., a time shifted version of the signal]..
• Such an autonomous [no input] shift register, can never have all zeroes as its state, and
therefore as it cycles through all possible non-zero states, the output of the shift register
will have one more one than zeros [and thus the number of ones is 1/2 (M+1)]
• Using the above, the periodic correlation function is given by
NA − N D
θb ( k ) = = 1, k = mM
M
1
=- , k ≠ mM
M
since for k=mM, the words are aligned and NA = M and for arbitrary k, the modulo-2
sum [or the product in real numbers] remains a shift register output sequence, then there
is one more one than zero, so that NA-ND=1.
• Using the above result, the correlation function becomes
ε ε τ 1 τ τ 1
Rc (τ ) = (1 − )θ b ( k ) + θ b (k + 1) = (1 - ) − ( ) = 1 − (1 + )
Tc Tc Tc M Tc Tc N
15
Correlation Function of the Code Sequence-4
16
DS-CDMA Receiver ----One User and No Channel Distortion
• Consider a DS-CDMA system with a single user b(t), spreading code c(t), and AWGN
n(t). The received signal is r(t) = c(t) bi(t) + n(t), i = 1,2; 0 < t < T. Let the signal bi(t)
be an equiprobable binary [1 or -1] signal. Initially we assume no channel distortion.
• The Maximum Likelihood receiver computes p[r(t)| bi(t)]. Given bi(t), the detection
problem reduces to a known signal [c(t)bi(t)] in AWGN. The ML detector is thus a
minimum distance detector that simplifies to a correlation detector [as in Chapter 2].
The receiver has filters that correlate r(t) with vi(t) =c(t)bi(t), for i =1,2 over the interval
0 < t < T [ie, over the entire symbol interval]. See next page for a correlator receiver.
• The output of the ith correlator recovers the signal, and is given by
T T
Li = ∫ r (t)[c (t )bi (t )]dt = ∫ [c(t )b(t) + n(t )][c (t )bi (t )]dt
0 0
T
= ∫ [c 2 (t )b(t)bi (t ) + n(t )c (t)bi (t )]dt [note that c 2 (t ) = 1]
0
T
= ∫ [b(t )bi (t ) + n(t )c (t)bi (t )]dt
0
• Note that for no noise, the output L i will be positive when the actual
transmitted signal b(t) = bi (t) and negative when b(t) = - bi (t). This is analogous
to sampling and recovering a TDMA signal.
• The effect of the noise (ie, the second) term is to pass a wideband noise signal
[since the noise is multiplied by the wideband signal c(t)] through an integrator
over (0, T). The integrator appears like a low - pass filter of bandwidth ~ 1/T to
the noise. Thus the noise appearing at the correlator output is reduced by the
processing gain factor Tc /T.
17
Signal Detection [Correlator and Matched Filter] with K-ary Transmission
t = Tb
∫ (•)dt
Tb Z1
Received Signal v1(t)
Plus Noise: Minimum
t = Tb Decision
∫ (•)dt
Tb Z2
Distance
Decision
r (t ) = v(t ) + n(t ) Calculator
v 2(t)
t = Tb
∫ (•)dt
Tb ZK
v K(t) (a)
t = Tb
Matched Filter
v∗1(Tb– t) Z1
u(t ) 1 1 1 1
W W W W
Transmitted
Signal
Σδ(t – n/W )
h1 (t) h2(t) h3(t) hL(t)
Tb Tb L
n
∫0 r (t )vk (t )dt = ∫0 r (t )∑
n =1
hn (t )u k (t − ) dt, k = 1,2
W
21
RAKE receiver for binary antipodal signals transmitted over a frequency-
selective fading channel- delayed reference/code implementation. There are
two realizations of the filter [ i=1,2] and we note that 1/W~Tc/2
ui(t ) 1 1 1 1
W W W W
r(t )
∑
∑
∑
∑
β
∑
∑
∑
1 2 3
τ
α(sc)
n
23
Performance of the RAKE Receiver: Single User System
• There are L diversity channels each carrying the same information-bearing signal. We will
assume that each channel is slowly fading with Rayleigh distributed envelope statistics, and
the fading process among the channels is assumed to be mutually statistically independent
and to each contain AWGN T T
b L b
n
• The optimum receiver computes: Lk = ∫ r (t )vk (t )dt = ∫ r (t )∑ hn (t )uk (t − )dt, k = 1,2
0 0 n =1 W
L
n
and the expression is simplified by substituting r (t) = ∑ hn (t)ui ( t − ) + n (t), i = 1,2 in the above
n=1 W
L L
and the output can be expressed as: Lk = bi bk E p ∑ h + ∑ hk N k
2
k [note the sign of the mean for k=i]
k =i k =1
Tb
k
where N k = ∫ n (t )u k (t − ) dt and E p is the energy in u (t ).
0
W
• To calculate the error probability we condition on a fixed set of channel weights hk and
determine this conditional error probability and then average over the probability density
function of the{hk}.
• For a fixed set of {hk } the decision variable is Gaussian [a linear combination of Gaussian
variables] with mean and variance given respectively by
L L
Ep∑h 2
k and σ = E p N 0 ∑ hk2
2
k =i k =1
24
Performance of the RAKE Receiver-2
• For these values the probability of error [ie, the probability that the decision statistic is
negative] is given by
1 Ep L L
Pe = erfc( γ b ) , where the SNR per bit, γ b , is given by γ b =
2 N0
∑ h = ∑γ
k =1
2
k
k =1
k
E p hk2
and γ k = is the instantaneous SNR on the k th channel.
N0
The characteristic function ψ X ( jω ) = E[e ] is the Fourier Transform of the probability
jω X
•
density function of the random variable X. The characteristic function provides a simple
method for determining the pdf of a sum of independent random variables. If Y=
X1+X2 +….+XL, then ψ Y (ω ) = [ψ X (ω )] , (where it is assumed that the X’s are
L
identically distributed) and the pdf of Y is computed by taking the inverse Fourier
Transform.
• Since the fading on the L channels is statistically independent, we can calculate the
characteristic function by recalling that for L=1, γ has a chi-square probability density
function with a characteristic function Ψγ ( jω ) = 1 and raising this function to
1− jωγ
the Lth power [which is the characteristic function of a chi-square distributed random
variable with 2L degrees of freedom].
• The final step is to average the conditional error probability over the fading channel
statistics (which can shown to be):
∞ L
1 2 L − 1 Note how the RAKE receiver uses the
Pe = ∫ Pr(e | γ ) p(γ ) dγ ≈ , diversity of the L independently fading signals
0 4γ L
so that the probabilit y of error varies as ≈ 1/γ raised to the Lth power [note : not exponential as with Gaussian noise] 25
DS-CDMA Mobile Receiver without Multipath: The Terminal/Mobile
• Now, consider the CDMA system with N users, bj(t), 1<j<N. Up to N of the users are
transmitting at the same time (on the same frequency) and the received signal, r(t), 0 < t
<T is given by
N
r (t ) = ∑ c j (t )b j (t ) + n(t ), where n(t) is AWGN, and we assume binary
j =1
baseband modulation [say ± 1] for each of the b j (t). To use notation simular to that used
in our detection discussion [Chapter 2], we use b ji (t ) to mean that the signal b j (t )
of the j th user assumes the value b ji(t) , i = 1,2; note that all N signals may be
transmitted during (0, T). At a base station there will be N detectors, where the detectors will jointly
process the entire received signal and try to determine whether b j (t) is + 1 or - 1, (for j = 1,2, ...N).
Typically at a mobile there will be a single detector for that users bit stream.
• The detection of the single signal bj(t) [eg, at the jth terminal] is different than any problem
we have studied so far ---since there are (up to) N-1 other signals being received [at the
base station we typically consider the joint detection of all the N signals]. To detect the jth
signal we can make use of the Central Limit Theorem and regard the other signal-dependent
terms as “Gaussian” Noise. This assumption reduces the problem to the detection of a
known signal cj(t) bji(t) in noise [the noise being the sum of the additive Gaussian Noise
and the signal-dependent “noise”]. We will consider multi-user detection problem at the
base station later.
26
DS-CDMA Mobile Receiver without Multipath: The Terminal/Mobile ---II
= c j (t )b j (t ) + z (t ),
where z (t ) is the combined background noise (the AWGN) and the " noise" due to the other
transmitte d signals. Following our convention , we denote the possible values of b j (t ) by b ji (t ),
where i = 1,2 . Now, the problem of detecting b j (t ) again reduces to detecting a
known signal in additive " noise". But, is the noise Gaussian and white?Whi le,
strictly speaking, the interferen ce is not Gaussian, we can use the Central Limit Theorem
to appoximate the interferen ce noise as Gaussian. Now to determine if the " noise"
N
is white, we consider t he statistics of the noise ∑ c k (t )b k (t ). The average value of the noise, is
k =1
k≠ j
N N N
E ∑ c k (t )b k (t ) = ∑ E[ ck (t )bk (t )] = ∑ c k (t ) E[bk (t )] = 0. Note that ck (t) is
k =1 k =1 k =1
k≠ j k≠ j k≠ j
27
DS-CDMA Mobile Receiver without Multipath: The Terminal/Mobile ---III
independent, this expression will be zero unless i = k [or k - 1 and k + 1], so the correlation simplifies
N
to the single summation u(t, τ ) = ∑ c i (t )ci (t + τ )E[bi (t )bi (t + τ )]. Since bi (t ) is ± 1, E[bi (t )bi (t + τ )] is
i =1
i≠ k
different chips and the summation will be ~ 0; for | τ | < Tc it can be shown [see
Peterson et al pg 125 - 128] that a good approximation to the time - correlation function is
the triangular function [where MTc = T ] (a picture is on the next page)
T
τ 1 1
Rc (τ ) = ∫ ci (t )c i (t + τ )dt =(1 − )1 + − , τ ≤ Tc
0 Tc M M
1 M-1
=- , Tc ≤ τ ≤ Tc
M 2
28
DS-CDMA Mobile Receiver without Multipath: The Terminal/Mobile ---IV
Correlation function
• The power spectrum is found by taking the Fourier Transform of the above correlation
function and can be shown to be [see next page ---taken from reference]
∞
S( f ) = ∑ P ( f )δ ( f − mf
m = −∞
m 0 )
29
DS-CDMA Mobile Receiver without Multipath: The Terminal/Mobile---V
j ∑
Correlating the received signal r (t ) = c (t )b (t ) + c (t )b (t ) + n(t ) 0 ≤ t ≤ T
j
k =1
k k
k≠ j
with the stored reference signal c j (t )b ji (t ) for i = 1,2, produces the output
T T N
L ji = ∫ r (t )[c j (t )b ji (t )]dt = ∫ [ c j (t )b j (t ) + ∑ ck (t )bk (t ) + n (t )][ c j (t )b ji (t )]dt
0 0 k =1
k≠ j
T N T T
= ∫ c (t)b j (t )b ji (t ) dt + ∑ ∫ bk (t )b ji (t )c j (t )ck (t ) dt + ∫ n (t )c j (t )b ji (t ) dt
2
j
0 k =1 0 0
k≠ j
now we observe that c 2j (t) = 1 , that bk (t )b ji (t ) is a constant over (0, T), and that
T
∫
0
c j (t ) ck (t )dt = 0 (for j ≠ k )[ this is true if the time base of the codes are
aligned - - - if not, then the cross terms will behave like wideband noise
and they will be low - pass filtered by the correlator (and this interferen ce noise
will be reduced by the " processing gain) .
These observatio ns allow us to simplify L ji , so that
T T
on the transmitt ed symbol - - - just like the case with a single transmitt er].
So, if the time bases are aligned the correlatio n [or matched filter] receiver will
totally eliminate the interference caused by the other users transmitt ed signals.
31
CDMA Transmitter and Receiver: When the timebases of the codes are
synchronized [e.g., downlink in IS-95]
• Transmitter:
1
b 1(t) c 1(t)
y1(t)
PN 1
2
b 2(t) c 2(t)
PN 2
y2(t) +
.
.
. yN(t) A cos(ω c t + φi )
N
b N(t) c N(t)
PN N
Tb N
= 0, if i ≠ j
Vin (t)
∫0
Tb vo (t)
c 1 (t) Sample at t = T
Coherent carrier PN code
A1 cos (ωo t + φi )
32
CDMA Synchronized Multi-User Receiver with N Users, No Distortion: The Base Station
K
In a multiuser base station receiver the transmitt ed signal is s(t ) = ∑ bk (t )c k (t ), where bk (t ) is the k th user signal
k =1
and ck (t ) is the k th spreading code [the code is a periodic signal with period equal to a symbol interval T but for
convenience here we will define the code to exist over (0, T).]. To accommodate user transmission over
N symbol intervals we express bk (t ) as the PAM signal [where bk ( n) represents the n th symbol transmitted
N
by the k th user source] bk (t ) = ∑ bk (n )c k (t − nT − τ k ), where τ k is the delay in the k th channel. The received signal
n =1
K N
is r (t ) = s(t ) + n (t ) = ∑∑ bk ( n) ck (t − nT − τ k ) + n (t ), 0 ≤ t ≤ NT + T [for K users or transmi tting signals]
k =1 n =1
We first consider synchronous transmiss ion, where the timebases of the signals are synchronized. Here,
we need only consider a single symbol being transmitted by each user and there is only interference from a single
symbol of each other user. We can assume that the user informatio n signal is constant over a symbol period so that
K
r (t ) = ∑ b k ck (t ) + n(t ) is the received signal over the interval (0, T). For simplicity we will assume that binary
k =1
antipodal signals are used to transmit the informatio n from each user.
33
DS-CDMA Multi-User Receiver: The Optimum Receiver
Th e optimum receiver is defined as the receive that selects the most probable sequence of bits {bk (n ), 1 ≤ n ≤ N, 1 ≤ k ≤ K}
given the received signal r (t ) observed over the time interval 0 ≤ t ≤ NT + T. First, let us consider synchronou s transmiss ion,
where each user produces exactly one symbol which interferes with the desired symbol. In AWGN [remember the actual
channel will have non - Gaussian fading], it is sufficient to consider the signal received in one symbol interval (0, T). The
Maximum Likelihood [ML] computes the log - likelihood function of the signal vector b(1) = [b1 (1), b2 (1),...., bK (1)]′ ,
where the ′ denotes the transpose d vector. In what follows we simplify b (1) by writing b. This likelihood is given by
2
T K
Λ(b ) = ∫ r (t ) − ∑ bk (1)ck (t ) dt , and selects the informatio n sequence {bk (1), 1 ≤ k ≤ K} that minimizes Λ(b).
0 k =1
Expanding the above integral we get :
T K T K K T
Λ(b ) = ∫ r (t )dt − 2∑ bk (1)∫ r (t )ck (t )dt + ∑∑ bk (1)b j (1) ∫ c k (t )c j (t )dt
2
0 k =1 0 j =1 k =1 0
We see that the first integral is common to all possible sequences and is of no relevance in determinin g which sequence
T
was transmitt ed. The term rk ≡ ∫ r (t )c k (t )dt represents the cross - correlation of the received signal with each of the
0
T
K code sequences (of course we can use matched filters), and the term ρkj ≡ ∫ c k (t )c j (t )dt involves the cross - correlation
0
of the code words. Thus minimizing the log - likelhood Λ(b ) is equivalent to maximizing the correlation metric(s)
K K K
C(rK , b K ) = 2∑ bk (1)rk − ∑∑ bk (1)b j (1)ρkj = 2b ′K rK − b ′K Rb K , where the ' symbol denotes the transposed vector,
k =1 j =1 k =1
and R is the code correlation matrix wit h elements ρkj . Note that the optimum detector must have knowledge of the received signal
energies. Note that ther e are 2 K possible choices of the bits in the informatio n sequenceof the K users [ie, the detector complexity
grows exponentia lly with the number of users]. Note that if the codes are uncorrelated, the receiver becomes rather straightfo rward,
K K K
1
since in this case ñ kj will be zero unless k = j and the metric becomes C(rK , b K ) = 2 ∑ b k (1)rk − ∑ b 2 k (1)ñ kk = 2 ∑ [b k (1)rk − ],
k =1 k =1 k=1 2
which reduces to symbol - by - symbol threshold detection (as we have seen before with the terminal detector).
A realizatio n of the detector is shown on the next page.
34
Optimum Multiuser Receiver for Synchronous CDMA Transmission
t = Tb
∫ (•)dt
Tb r1 Computes
the metric
c1(t)
C(rK,bK)
t = Tb Decision
∫ Tb
(•)dt
r2
and selects
the set of
r (t ) bits, bK,
c 2 (t) that max
t = Tb
∫
the metric
(•)dt
Tb rK
c K (t)
35
CDMA Asynchronous Multi-User Receiver with N Users, No Distortion: The Base Station
For Asynchrono us Operation there will be interferen ce from two consecutiv e symbols from each interfere - - - the symbol in the
same symbol periodand the symbol in the preceding period. Strictly speaking, then the optimum receiver would need an equalizer
following the RAKE - type of receiver. We will defer equalizati on until later in the course. We will assume that the receiver knows
the energies, Ε k for each of the K users [in the synchroniz ed analysis we assumed this energy was unity, but here it way play a more
important role], as well as their delays τk . These parameters must be measured at the receiver [by correlation technique s]. As
before, the Maximum Likelihoo d receiver computes the log - likelihood function
NT+T 2
K N
∆ (b ) = ∫
r ( t ) − ∑
k =1
Ε k ∑ bk (i )ck ( t − iT − τk ) dt
i =1
0
NT+ T K N NT +T K K N N NT+T
= ∫ r (t )dt − 2 ∑ Ε k ∑ bk (i )
2
∫ r (t)c (t − iT − τ )dt + ∑∑
k k Ε k Ε l ∑∑ bk (i)bl ( j ) ∫ c (t − iT − τ )c (t − jT − τ )dt,
k k l l
0 k =1 i =1 0 k =1 l =1 i =1 j =1 0
and as before the first integral may be ignored, since it is common to all possible informatio n sequences. We use the following notation
( i +1)T +τ k
rk (i ) = ∫ r (t )c (t − iT − τ )dt ,
k k 1≤ i ≤ N to denote the output of the correlator for the k thuser in each of the symbol intervals,
iT +τ k
NT+ T
and the integral ∫ c (t − iT − τ
k k )cl (t − jT − τl )dt may be decomposed into terms involving the cross correlation
0
T
ρkl (τ ) = ∫ ck (t − τk )cl ( t − τl )dt for k ≤ l and k > l. We observe that the log - likelihood function may be expressed in terms of
0
a correlation metric that involves the outputs {rk (i ), 1 ≤ k ≤ K , 1 ≤ i ≤ N } of K correlators - - - one for each user. In terms of vector notation
the NK correlator, or matched filter, outputs can expressed in the form
r = R Nb + n, [this vector constitute s a sufficient statistic for detecting the transmitt ed bits bk (i )]
and we have the following terminolo gy and definitions
r = [r′(1) r ′(2) ... r′( N )]′
r (i) = [r1 (i ) r2 (i ) ... rK (i )]′
b = [b′(1) b′( 2) ... b′( N )]′
b(i ) = [ Ε1 b1 (i ) Ε 2 b2 (i) .... Ε K bK (i)]′
n = [n′(1) n′( 2) ... n′( N )]′
n(i ) = [n1 (i ) n2 (i ) ... n K (i )]′ 36
CDMA Asynchronous Multi-User Receiver with N Users, No Distortion:II
∞
and R c (m)is a K × K matrix wit h elements R k l (m) = ∫c k (t − τk )cl (t − τl )dt,
−∞
and the Gaussian noise vectors n (t) have zero mean and an autocorrelation matrix
1
E[n (k )n ′( j)] = N 0 R c ( k − j)
2
37
CDMA Asynchronous Multi-User Sub-Optimum Receivers
Here we are interested in suboptimum detectors whose complexity grows linearly with the
number of users, K. The simplest suboptimum detector is the (conventional) single user
detector that we studied in connection with the mobile.
• Conventional single-user detector: as with the mobile receiver, the receiver for each user consists of
that correlates the received signal with the code sequence of the user and passes the correlator output
to the detector. The detector makes a decision based on a single correlator output, and neglects the
presence of the other users of the channel, or equivalently, assumes that the noise-plus-interference
is white and Gaussian. As before the output of the correlator for the kth user for the interval 0<t<T is
T K
rk = ∫ r (t)c k (t) dt = Ε k bk (1) + ∑ Ε j b j (1) ρ jk (0) + n k (1),
0 j =1
j ≠k
T
where the noise component is given by n k (1) = ∫ n(t )ck (t )dt
0
1
Since n(t) is Gaussian Noise with power spectral density N 0 the variance of n k (1) is
2
[ 1 T 2
] 1
E n (1) = N 0 ∫ ck (t) dt = N 0 .
2
k
2 2
0
As we have seen before, if the code words are orthogonal , the interference from the other users
K
[captured by ∑ Ε j b j (1) ρ jk (0) in the above] vanishes and the single - user detector is optimum.
j =1
j ≠k
On the other hand, if one or more of the code sequences are not orthogonal to the user, the interference from
other users can become excessive if the power levels[or the received signal energies] of one or more of the
users is sufficient ly larger tha n the power levelof the k th user. This situation is generally called the near - far problem ,
and necessitates some form of power control for this receiver to work properly.
38
CDMA Asynchronous Multi-User Sub-Optimum Receivers-II
• Decorrelating Detector: This is a detector that has linear computational complexity, but does
exhibit the same level of vulnerability to other-user interference. The detector is motivated by the
synchronous system. Here the received signal vector rK that represents the output of the K matched
filters is rK = RsbK + nK
where b K = [ Ε1 b1 (1) Ε 2 b2 (1) .... Ε K bK (1)]′ and the noise vector n = [n (1) n (1) ... n (1)]′
K 1 2 K
has a covariance E[nK n’K ]=(N0/2)Rs. Since the noise is Gaussian, rK is described by the K-dimensional
Gaussian probability density function
1 1
p(rK | b K ) = exp − (rK − R s b K ) ′R −s 1 (rK − R s b K )
( N 0π ) K det R s N0
The best linear estimate of bK is the value of bK that maximizes the likelihood function, which is
equivalent to minimizing the quadratic form in the exponent.
39
CDMA Asynchronous Multi-User Sub-Optimum Receivers-III
Receiver Structure for Decorrelation Receiver
t = Tb
∫ (•)dt
Tb r1
Linear
Transformation
c1(t) (Decorrelation)
t = Tb Decision
K = R s rK
−1
b opt
∫ Tb
(•)dt
r2
r (t ) and detector
c 2 (t)
t = Tb bˆ K = sgn(b opt
K )
∫ Tb
(•)dt
rK
c K (t)
K = R s rK
−1
The result of this minimization yields b opt where the superscript
stands for optimum, and will be shorted to “o” in the subsequent text. And the
detected symbols are obtained by quantizing each element ie,
bˆ K = sgn(b opt
K )
The receiver is shown above and since the estimate is obtained by performing a linear
transformation on the vector of correlator outputs, the computational complexity is linear in K.
40
Receiver Structure for Decorrelation Receiver: II
Consider the decorrelating receiver for the case of K=2. In this case
1 ρ 1 1 - ρ T
The receiver correlates the received signal r (t ) = Ε1 b1c1 (t ) + Ε 2 b2 c 2 (t ) + n(t ) with c1 (t ) and c 2 (t )
produces the following input vector to the Decorrelator
r1 Ε1 b1 + ρ Ε 2 b2 + n1
r = , where n1 and n 2 are the noise componentsat the output of the correlators.
2 ρ Ε1 b1 + Ε 2 b2 + n2
Thus the Decorrelated samples are
r1 Ε1 b1 + (n1 − ρn2 ) /(1 − ρ )
2
b opt
2 =R =
-1
s
2 Ε 2 b2 + (n2 − ρn1 ) /(1 − ρ )
r 2
This is a very interesting result because the decorrelating transformation has eliminated the
interference components between the two users. Consequently the near-far problem is
eliminated and there is no need for power control!
41
Successive Interference Cancellation: Another Sub-Optimum Detector
Successive Interference Cancellation (SIC) is based on removing the interfering signal waveforms
from the received signal, one at time as they are detected. One approach is to demodulate the
received signals in order of decreasing received powers. Thus, the user having the strongest signal
is demodulated and detected first. After a signal has been detected, the detected information is used
to subtract the signal of the particular user from the received signal.
When making a decision about the transmitted information of the kth user, we assume that the
decisions of users k+1, …,K are correct and we neglect the presence of users 1, 2, …, k-1. The
decision for the kth user, for synchronous transmission is
ˆb = sgn r −
K
k k ∑ Ε j ρ jk (0)b j
ˆ
j = k +1
where rk is the output of the correlator corresponding to the kth user’s code sequence.This approach
does not fully take into account the cross correlations among users. Another approach is to
demodulate according to the powers at the outputs of the cross correlators. In any event, each of these
approaches requires accurate estimates of the received signal powers [in order to cancel the interference]
Estimation errors result in residual multiuser interference. The delay in demodulating the weakest
signal increases linearly with the number of users. For asynchronous reception, the time delays
must also be estimated.
42
CDMA: Principal of Interference Cancellation
- +
Decode
Signal 1
Receive/
Reconstruct
Signal 1
Received Interference subtraction “Cleaner” signals
Signal
Receive/
Reconstruct
Signal 2
- Receive/
+ Decode
Signal 2
43
REPRESENTATIVE CDMA SYSTEM PERFORMANCE: Spread Spectrum Signal
when code timebases are not synchronized [e.g., uplink in IS-95]
Transmitter R e c e ive r
b 1 (t)
... ...
∫
PN gen Mod Demod PN gen
Integrate over Tb
• P robability of error in G a u s s ia n
Noise/Interference
P e = (1/2) e rfc 44
CDMA SYSTEM PERFORMANCE
-3
• Given: P e = 10 Processing gain = 128 [IS-95]
A 1 = A i for all I; Negligible noise
• Find: the maximum number of users
• Solution: From P e =1/2 erfc E /N ′ , we can
b o
obtain:
= 4.852
We then apply:
Thus the Signal-to-Interference Ratio [SIR]
A 2/2 T 3T
≈ 1 × b ≈ b degrades smoothly with the number of user
N 2 Tc 2Tc (N−1) [but the speech quality may be a step funcion
∑ A /3 of the number of users]. This “soft”
i
i=2 capacity” is in contrast to the hard limit on the
number of TDMA users.
to find the number of users = N = 41.
45
CDMA SYSTEM WITH BPSK: Power Spectrum
Data sequence bi(t)
+1
t
-1
0 Tb 2Tb
PN code Ci(t)
+1
t
-1
0 Tc
f
fo - 1/ Tc fo fo + 1/ Tc
46
RECEIVING A SPREAD SPECTRUM SIGNAL
Ci(t)
Synchronized desired
PN code rate, Tc
h(t)
≈ 2/ T f f
0 1/Tb c 0 1/Tb
47
RECEIVING A SPREAD SPECTRUM SIGNAL (continued)
h(t)
vin (t) Tb v 0 (t) v 0 (Tb )
∫( )dt Sample at t = Tb
0
h(t)
≈ 2 /T f f
0 1/T b c 0 1/T b
The above assumes that all signals are received at the same power level ---that is, perfect power control.
If an interfering signal is 10 dB hotter than the desired signal, it appears like ten interferers.
Signal power = S = Tb
Interferen ce power I Tc
48
System Throughput in a CDMA System as a Function of Modulation Format
[don’t expect to see modulation greater than QPSK in interference-limited systems]
System RN RN 0.4RN
Throughput
[rate • number of Note: we assume perfect power control, so that the interferers
users] have the same power as the received (desired) signal
49
EFFECT OF DELAY SPREAD ON CDMA PERFORMANCE
2 Path Downlink Example: Non-Rake Receiver
Phase Delay
Correlator
rotator Equalizer ∑I I
I
Q
Code Channel ∑Q Q
Generator Estimator
Finger 1 Combiner
Finger 2
Finger 3
Matched
filter