Professional Documents
Culture Documents
Act 2 Cdma2011 Beamer
Act 2 Cdma2011 Beamer
(CDMA)
Professor A. Manikas
Chair of Communications and Array Processing
Introduction
General Block Diagram of a Digital Comm. System (DCS)
148bits
0.577ms plus 8.25 guard bits
i.e. rb=104kbits/s f
890MHz 915MHz 935MHz 960MHz
0 Downlink 25MHz Uplink=25MHz
De…nition of a SSS
When a DCS becomes a Spread Spectrum System (SSS)
LEMMA
8 1: CS , SSS
< Bss message bandwidth (i.e. BUE=large)
i¤ Bss 6= f{message}
:
spread is achieved by means of a code which is 6=f{message}
where Bss =transmitted SS signal bandwidth
our AIM: ways of accomplishing LEMMA-1.
Prof. A. Manikas (Imperial College) EE401: Principles of CDMA 28 Oct 2011 8 / 94
Introduction De…nition of a SSS
NB:
I PCM, FM, etc spread the signal bandwidth but do not satisfy the
conditions to be called SSS
I Btransmitted-signal Bmessage
Classi…cation of SSS
F the jammer has full knowledge of SSS design except the jammer does
not have the key to the PN-sequence generator,
F i.e. the jammer may have full knowledge of the SSSystem but it does
know the PN sequence used.
Prof. A. Manikas (Imperial College) EE401: Principles of CDMA 28 Oct 2011 15 / 94
Introduction De…nition of a MAI
Remember:
F Jamming source, or, simply Jammer = intentional interference
F Interfering source = unintentional interference
if
BJ = qBss ; 0 < q 1 (6)
then
Eb Ps .BJ Ps .q.Bss
EUEJ = = = = PG SJRin q (7)
NJ PJ .rb PJ .B
Eb
EUEequ = (8)
N0 + NJ
1
N0
= PG SJRin q +1 (9)
Nj
where
Ps
SJRin , (10)
PJ
Comments on Property-4
I to combat multipath, consecutive bits of the code sequences should be
uncorrelated.
i.e. code sequences should have impulse-like autocorrelation functions.
Therefore it is desired that the auto-correlation of a PN-sequence is
made as small as possible.
I The success of any spread spectrum system relies on certain
requirements for PN-codes. Two of these requirements are:
1 the autocorrelation peak must be sharp and large (maximal) upon
synchronisation (i.e. for time shift equal to zero)
2 the autocorrelation must be minimal (very close to zero) for any time
shift di¤erent than zero.
I A code that meets the requirements (1) and (2) above is the
m-sequence which is ideal for handling multipath channels.
+ +
o/p
Q1 Q2 Q3 Q4 Q5 Q3 Q5
i/p
1 2 3 4 5 i/p
1 2 3 4 5
clock clock
Shift register 1/Tc Shift register
(a) (b)
Comments on Property-5
I If there are a number of PN-sequences
An Important "Trade-o¤"
However
2
Rauto 2
+ Rcross > a constant which is a function of period Nc (12)
m-sequences - de…nition
Nc = 2m 1 (13)
(which is the maximum period for the above shift register generator)
The initial contents of the shift register are called initial conditions.
c ( D ) = cm D m + cm 1D
m 1
+ .... + c1 D + c0 with c0 = 1 (14)
0 =) no connection
rule: if ci = (15)
1 =) there is connection
degree-m polynomial
3 D3 + D + 1
4 D4 + D + 1
5 D5 + D2 + 1
6 D6 + D + 1
7 D7 + D + 1
Please see Comm Systems LNs (Spread Spectrum Topic) for some
tables of irreducible & primitive polynomial over GF(2).
Implementation of an m-sequence
use a maximal length shift register
i.e. in order to construct a shift register generator for sequences of any
permissible length, it is only necessary to know the coe¢ cients of the
primitive polynomial for the corresponding value of m
1
fc = = chip-rate = clock-rate (16)
Tc
c ( D ) = cm D m + cm 1D
m 1
+ .... + c1 D + c0 (17)
with c0 = 1 (18)
Example: c (D )= D 3 + D + 1 = primitive=)power= m = 3
I coe¢ cients=(1, 0, 1, 1) ) Nc = 7 = 2m 1 i.e.period= 7Tc
o/p
1st 2nd 3rd
initial condition 1 1 1
clock pulse No.1 0 1 1
clock pulse No.2 0 0 1
clock pulse No.3 1 0 0
clock pulse No.4 0 1 0
clock pulse No.5 1 0 1
clock pulse No.6 1 1 0
clock pulse No.7 1 1 1
Note that the sequence of 0’s and 1’s is transformed to a sequence of
1s by using the following function
o/p = 1 2 i/p (19)
Prof. A. Manikas (Imperial College) EE401: Principles of CDMA 28 Oct 2011 33 / 94
m-sequences Autocorrelation of ‘m-sequences’
Autocorrelation of ‘m-sequences’
An m-sequ. fα[n ]g has a two valued auto-correlation function:
(
Nc
Nc k = 0 mod Nc
Rαα [k ] = ∑ α[n ]α[n + k ] = (20)
n =1 1 k 6= 0 mod Nc
Gold Sequences
Basics of CDMA
BLOCK DIAGRAM
>
: j-th user
2 non-synchronous
8 DS-CDMA
> i-th user
<
>
:
j-th user
DS-CDMA: Synchronization
The Rx requires a replica of the PN code, with the correct clock
phase, in order to despread the signal.
Therefore, Rx =“synchronization circuits” + “demod. circuits”
The process of synchronizing the receiver to the transmitter’s PN
code consists of two stages:
I Acquisition (coarse synchronization).
I Tracking (…ne synchronization).
Type of channels:
UPLINK DOWNLINK
Tra¢ c Channel Tra¢ c Channel
Access Channel Pilot Channel
Synchron.Channel
Paging Channel
In a CDMA system, the available spectrum and time are not split into
distinct slots. Instead the whole (available) spectrum is used by each
user.
Since the same frequency channel could be used by all the
users/subscribers, the reuse distance D could be reduced to 1, i.e.
Signal Overlay
The spread spectrum signal, from a CDMA system, has a very low power
spectral density and, therefore, a CDMA system can overlay on top of
existing narrow-band mobile cellular systems (of the same frequency
band).
This is because the interference (due to CDMA signals), added to a
narrow-band mobile system channel, is very low and, therefore,
the presence of CDMA signal will hardly a¤ect the performance of the
narrow-band mobile system.
The CDMA system, however, needs to perform some extra processing to
reject the narrowband interference due to the presence of the narrow-band
signals.
Comment:
The capacity and performance of a mobile cellular system could be
signi…cantly improved by using CDMA techniques. In the paper “On the
Capacity of a Cellular CDMA”, IEEE Transactions on Vehicular
Technology, Vol.40, 1991 (by Gilhousen et al) the improvement in the
capacity is discussed and it is stated that “no other proposed scheme
appears to even approach this (CDMA) performance”.
Prof. A. Manikas (Imperial College) EE401: Principles of CDMA 28 Oct 2011 50 / 94
Analysis of a Direct Sequence CDMA System
F DS/QPSK
objective:
to relate the BER pe with the total number of users K as well as with
the EUEequ at the receiver.
i.e.
pe = f{EUE equ
,K } (22)
Main Assumptions
p
Note that the carrier of i th transmitter is Pi . exp (j (2πFc t + ψi ))
P
SNIRout = K Z T cs
(29)
N0 P
2Tcs
+ 2
Tcs ∑ 0
Rb2i b1 (τ i ) + R̃b2i b1 (τ i ) d τi
| {z } | i =2
{z }
,P n,out ,P MAI
( R τi
Rbi b1 (τ i ) =
b (t τ i ).b1 (t )dt even cross-corr.
where R0T cs i (30)
R̃bi b1 (τ i ) = τi bi (t τ i ).b1 (t )dt odd cross-corr.
Z T cs
! 1
K
N0 1
SNIRout =
2PTcs
+ 2
Tcs ∑ 0
Rb2i b1 (τ i ) + R̃b2i b1 (τ i ) d τi
i =2
= for you ...
1
K 1 1
+
3Nc 2 EUE
However,
pe = T npSNIR out
o
(32)
therefore, 8 9
>
> >
>
< =
pe = T >> r K 1
1
1 > >
(33)
: + ;
3Nc 2 EUE
BPSK Examples
The data bits of each user are now grouped in symbols of 2-bits. For
instance,
and the i-th user’s binary information may be now represented by two
di¤erent data signals mIi (t ) and mQi (t ) and one PN-signals bi (t ), as
follows:
Note that mIi (t ) is formed by the even data bits and mQi (t ) by the
odd ones.
bi ( t ) = ∑ αi [k ].c2 (t kTc )
k
GI 1 = Re fG1 g (45)
and
GQ 1 = Re fG1 g (46)
Then it can be found (proof for you) that the SNIR at the output of
the inphase branch output of the desired correlator is
1 P
SNIRout = (47)
2 K ZT cs n o
N0 P
2Tcs
+ 2
Tcs ∑ Rb2i b1 (τ i ) + R̃b2i b1 (τ i ) d τ i
i =2 0
Since, the bit errors in the two branches are statistically independent
the probability of symbol error is given as follows
.
The data bits of each user are now grouped in symbols of 2-bits.
For instance, consider a DS-QPSK SSS with φ = 45 (Gray code)
At the Transmitter:
Power Control
(
TDMA/FDMA: very di¢ cult
implementation of voice activity:
CDMA: very easy
For a large number of users the capacity increases by a factor 1/a.
Therefore, using the voice activity monitoring approach the capacity
and the performance of a CDMA system will be improved
(this improvement cannot be obtained in FDMA/TDMA systems)
In particular the power of a user’s signal at a speci…c time instant can
be expressed 1 Puser with probability a and 0 Puser with
probability (1 a).
k k
Pr(k users are active) = a (1 a )K k
(53)
K
Eb
BPSK : SNIRout = 2.EUEequ = 2 = (for you) = (55)
Nj + N0
Appendices
Appendix-1: Proof of DS-BPSK/CDMA SNIR-out (Equ.29)
desired term
z Z
}| {
1 nT cs p
G1 = P. m1 (t ) .b1 (t ) .b1 (t )dt
Tcs (n 1 )T cs | {z }
= 1 =a [n ]
MAI term
z }| {
K Z nT cs p
1
+
Tcs ∑ P.mi (t τ i ).bi (t τ i ) exp(j φi ).b1 (t )dt
i =2 (n 1 )T cs
noise term
z Z nT cs
}| {
1
+ n (t ).b1 (t ). exp( j2πFc t )dt (57)
Tcs (n 1 )T cs
R nT cs R T cs
To simplify the notation (n 1 )T cs will be replaced by 0
repeated in
every interval for any n.
(
ai [n 1] denotes the previous information bit
For the i-th user
ai [n] denotes the current information bit
Note: ai [n 1] and ai [n] are variables of 1’s
desired term:
a 1 [n ]
Z T cs p z }| {
1
desired = P.m1 (t )b12 (t )dt
Tcs 0
=T cs
p zZ }| {
P T cs
= a1 [ n ] b12 (t )dt
T 0
pcs
= P.a1 [n ] (58)
MAI term:
1 =ai [n 1 ]
K Z τi p z }| {
1
MAI =
Tcs ∑f 0
P mi (t τ i ).bi (t τ i ).b1 (t ) exp(j φi )dt
i =2
1 =ai [n ]
Z T cs p z }| {
+ P.mi (t τ i ).bi (t τ i ).b1 (t ) exp(j φi )dt g
τi
p K Z τi
P
=
Tcs ∑ f ai [ n 1]
0
bi ( t τ i ).b1 (t )dt
i =2
Z T cs
+ ai [ n ] bi (t τ i ).b1 (t )dt g exp(j φi )
τi
p K
P
Tcs i∑
= ai [n 1]Rbi b1 (τ i ) + ai [n]R̃bi b1 (τ i ) exp(j φi )(59)
=2
noise term
Z T cs
1
noise term = n (t ).b1 (t ). exp( j2πFc t )dt
Tcs 0
and, …nally,
p
p P K
G1 = a 1 [ n ] P +
Tcs ∑ ai [ n 1]Rbi b1 (τ i ) + ai [n ]R̃bi b1 (τ i ) . exp(j φi )
i =2
Z T cs
1
+ n (t ).b1 (t ). exp( j2πFc t ) dt (62)
Tcs 0
From Equ 62, it is evident that the …rst term is the desired signal
term, the second term the code noise produced by the
cross-correlation with the codes of other users, and the last term the
additive white Gaussian noise introduced by the channel.
It can also be seen that G1 is a random variable that is dependent on
the mutually independent random variables φi , τ i , ai [n 1] and ai [n]
for 1 i K , i 6= j. To simplify, it is reasonable to assume that the
random variables φi and τ i are uniformly distributed on the intervals
[0, 2π ] and [0, Tcs ] respectively, and ai [n 1], ai [n] take values 1
with equal probability.
With the above assumptions, the powers of the three terms in 62 can
be found as follows:
I desired power:
p 2
Pdesired = E P.a1 [n ] =P (63)
I MAI power:
8 !2 9
< pP K =
PMAI = E
: Tcs ∑ ai [ n 1]Rbi b1 (τ i ) + ai [n ]R̃bi b1 (τ i )
;
(64)
i =2
P K n n oo
∑
2
= E ai [ n 1]Rbi b1 (τ i ) + ai [n ]R̃bi b1 (τ i )
Tcs2 i =2
(65)
I Since
Equation 65 becomes
K n o
P 2 2
PMAI = 2
Tcs ∑ E ai [ n 1]Rbi b1 (τ i ) + E ai [n]R̃bi b1 (τ i )
i =2
Z
Pc K T cs
= 3 ∑
Tcs i =2 0
Rb2i b1 (τ i ) + R̃b2i b1 (τ i ) d τi (69)
I noise term:
( Z 2
)
1 T cs N0
Pnoise = E n (t ).b1 (t ). exp( j2πFc t ) dt = ... =
Tcs 0 2Tcs
(70)
Prof. A. Manikas (Imperial College) EE401: Principles of CDMA 28 Oct 2011 93 / 94
Appendices Appendix-1: Proof of DS-BPSK/CDMA SNIRout (Equ. 29)