Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Шумов задачи и учебник / [Valeri_P._Ipatov]_Spread_Spectrum_and_CDMA_Princ(Bookos.org).pdf
Скачиваний:
93
Добавлен:
15.04.2015
Размер:
3.46 Mб
Скачать

214

Spread Spectrum and CDMA

 

 

bit and f1 þ Fi for a data bit equal to one. Figure 7.12b shows this for the bit stream 00101101. The principal difference between fast and slow FH is now seen: the latter does not spread the spectrum of an individual data symbol, widening just the total bandwidth occupied by the system. It looks like a system that merely switches from one operational frequency to another from time to time but within a fixed group of data symbols no switching happens. At the receiving end down-conversion to an intermediate frequency fi is accomplished with the aid of a reference signal repeating the signature frequency pattern (with an appropriate delay) on the carrier f0 fi (Figure 7.12c). This returns the waveform to the bandwidth inherent to a plain (non-frequency-hopping) FSK data modulation (Figure 7.12d), so that an ordinary FSK demodulator may restore the transmitted data (Figure 7.12c).

The techniques illustrated in the examples above for binary data transmission are easily extended to a general FSK data modulation (see Problems 7.5–7.7).

FH spreading has some features that make it especially attractive for military applications, in particular in various antagonistic scenarios of games against jamming systems [3,6]. At the same time, its commercial use had not until recently been significant, at least as regards fast FH. However, the advent of Bluetooth technology [55] indicates that this kind of spread spectrum may also possess good commercial prospects.

7.2 Designing signature ensembles for synchronous DS CDMA

7.2.1 Problem formulation

Consider a K-user DS CDMA system where all user datastreams and all signatures are strictly synchronized, i.e. have zero mutual time shifts, at the receiver input. As was pointed out in Section 4.4, a classical example of such a system is the downlink of CDMA mobile radio, where the base station controls entirely the timing of signals addressed to all users within the cell. Certainly, the group signal arrives at the mobile receiver preserving the initial synchronism between the signals sent to different individual users. In our current analysis we will operate with an idealized channel model, in which multipath delay spread max is smaller than the chip period D of users’ signatures, or an efficient equalizing is used, eliminating all the multipath components whose delays exceed D. This allows us to ignore any potential violations of perfect synchronism of components in a received signal.

In accordance with the concept of DS spreading, the complex envelope of a received group signal S_(t; b1, b2, . . . , bK ) is the sum in k of signature complex envelopes manipulated by users’ datastreams, each of them being defined by (7.6). Generally, each user’s signals may have its individual amplitude; however, we will restrict ourselves to the simplest case of equal intensities. Since the assumption of perfect synchronism permits us to set all delays k and initial phases k in (7.7) equal to zero, we then arrive at the expression of the received complex envelope (subscript r discarded as needless now):

 

 

 

K

 

 

_

 

 

X

_

 

Sðt; b1

; b2

; . . . ; bK Þ ¼

BkðtÞSkðtÞ

ð7:10Þ

k¼1

Spread spectrum signature ensembles

 

215

 

 

 

 

 

 

 

 

b1,i – 1

 

 

 

b1,i

 

 

b1,i + 1

1st user

a1,0

a1,1

a1,2

 

 

 

a1,N – 2

a1,N–1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

b2,i – 1

 

 

 

b2,i

 

 

b2,i + 1 t

2nd user

a2,0

a2,1

a2,2

 

 

 

a2,N – 2

a2,N–1

 

 

 

 

 

 

 

 

 

 

 

 

 

t

bK,i – 1

 

 

 

bK,i

 

 

bK,i + 1

Kth user

aK,0

aK,1

aK,2

 

 

 

aK,N – 2

aK,N – 1

 

 

 

 

 

 

N

 

 

 

t

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Figure 7.13 Data symbol and chip alignment in synchronous CDMA

Let us focus on a single data symbol interval of duration T. Again, due to the complete synchronism the current data symbols of all users start and end strictly simultaneously. With bk being the kth user’s current data symbol, (7.10) during a single symbol interval may be written as follows:

 

K

 

 

_

X

_

ð7:11Þ

Sðt; bÞ ¼

 

bkSkðtÞ

k¼1

where b ¼ (b1, b2, . . . , bK ) is the K-dimensional vector of current data symbols of all users. Remember now that every signature in the DS CDMA system is an APSK signal

described by the model (5.2):

_

N 1

_

 

SðtÞ ¼

X

ak;iS0ðt iDÞ

ð7:12Þ

 

i¼0

where fak, 0, ak, 1, . . . ak, N 1g is a code sequence, manipulating chips of the kth signature, and N is a spreading factor, i.e. the number of chips per one data symbol. Figure 7.13 emphasizes the strong mutual alignment between signature chips and boundaries of transmitted data symbols characteristic of synchronous CDMA.

Based on (7.11) and (7.12), several approaches to designing signature ensembles for synchronous DS CDMA networks may be formulated. Among the main factors influencing the procedure and results of the signature set optimization is the relation between the number of users K and spreading factor N, as well as the receiver algorithm (multiuser or conventional).

7.2.2 Optimizing signature sets in minimum distance

Suppose that the receiver of any complexity is admissible and, therefore, we are allowed to use the optimal (multiuser) algorithm of estimating the data vector b based on the search for the value of b minimizing the distance between observation y(t) and the candidate group signal s(t; b) (see Section 4.1). In terms of the complex envelope this means

216

 

 

 

 

 

 

 

Spread Spectrum and CDMA

 

 

 

 

 

 

 

 

 

 

 

minimization in b of the squared distance

 

_

_

 

2

, where

_

 

Y(t) S(t; b)

 

 

S(t; b) is given by

signatures fS1(t), S2(t), . . . , SK (t)g

 

 

 

 

 

 

(7.11). Then a solid theoretical motivation is evident

towards finding the ensemble of K

 

 

 

 

^

_

_

_

 

 

 

 

 

 

 

 

 

 

minimizing the probability of error in the estimate b of

a K-user data vector b ¼ (b1, b2, . . . , bK ). Returning to the material of Section 2.3, let us recollect that asymptotically (with SNR sufficiently high), minimizing the error probability is equivalent to maximizing the minimum distance in the constellation of M transmitted signals. In the studied case the alternative signals to be distinguished are copies of (7.11) corresponding to different data vectors b. Hence, we may formulate the problem of optimizing the signature set as maximization of the minimum squared distance:

 

 

 

 

 

 

 

d2

min d2

ð

b; b0

Þ ¼

max

 

 

 

ð

7:13

Þ

 

 

 

 

 

 

 

min ¼

 

b;b0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

b b0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

where the minimum distance dmin is found over all different

pairs of data vectors

b

¼

(b1

, b2

, . . . , bK ), b0

¼

(b0

, b0 , . . . , b0

), b

 

b0 and (see (2.43)):

 

 

 

 

 

 

 

 

 

1

2

K

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

d2ðb; b0

Þ ¼ ksðt; bÞ sðt; b0Þk2¼

1

 

 

ðt; b0Þ

2

ð7:14Þ

 

 

 

 

2 S_ðt; bÞ S_

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Let us study in more detail binary data transmission when the data symbols are bits transmitted directly by BPSK so that bk, b0k ¼ 1, k ¼ 1, 2, . . . , K. This narrowing of the scope makes the analysis a bit easier, subsequent spreading to a general PSK being straightforward. Then using (7.11), (2.41) and (2.42) in (7.14) results in:

d2ðb; b0Þ ¼ 2 k 1

"kS_kðtÞ

¼

2 Z

k 1 "kS_kðtÞ

dt ¼ Eb

k 1 l 1 "k"l kl

 

 

ð7:15Þ

 

 

 

K

 

2

 

 

T

 

K

 

 

2

K

K

 

 

 

 

 

 

 

 

1

X

 

 

1

 

X

 

 

X X

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Eb ¼

1

 

T

 

_

 

 

where "k ¼ bk bk0 takes on one of three possible values: 0 or 2;

2

 

0

 

Sk(t) dt is

the energy of the kth signature used for transmitting one bit, these

energies for all K

 

 

R

 

 

 

 

 

users assumed the same, and:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

T

S_kðtÞS_kðtÞ dt

 

 

 

 

 

 

 

 

 

 

 

 

 

 

kl ¼ 2Eb Z0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

is the correlation coefficient between the complex envelopes of the kth and lth signatures. Using properties of the correlation coefficients seen from its definition,kk ¼ 1, kl ¼ lk (7.15) takes the form explicitly showing that distance is always real:

K

K 1 K

 

X

X X

ð7:16Þ

d2ðb; b0Þ ¼ Eb "k2 þ 2Eb

"k"lReð klÞ

k¼1

k¼1 l¼kþ1

 

Take two data vectors (bit patterns) b, b0 differing in only one, for instance the first, component. Then "k ¼ 0, k ¼ 2, 3, . . . , K, "1 ¼ 2 and from (7.16) d2(b, b0) ¼ 4Eb. Since dmin2 is never greater than the squared distance for any specific pair of b, b0:

dmin2 4Eb

ð7:17Þ

Spread spectrum signature ensembles

217

 

 

This upper bound tells us that a signature ensemble, for which dmin2 ¼ 4Eb, should be treated as optimal according to the criterion of maximum minimum distance (7.13). One of the sufficient conditions of achieving the bound (7.17) is the weak orthogonality of complex envelopes of signatures:

Reð klÞ ¼

( 0; k

¼ l

¼ kl

ð7:18Þ

 

1; k

l

 

 

 

 

 

 

The reason why complex envelopes satisfying (7.18) are called weakly orthogonal becomes clear after comparison of (7.18) and (2.46) ( kl ¼ kl). The latter is much more demanding and forces the signals sk(t), sl(t) with the complex envelopes S_k(t), S_l(t) to preserve orthogonality under any mutual phase shifts. At the same time, two signals modulated by S_(t) and S_(t) exp [j( /2)] ¼ jS_(t), i.e. just quadrature (phase shifted by /2) replicas of the same signal, are orthogonal, but lose orthogonality if their mutual phase shift differs from /2. Hence, S_(t) and jS_(t) are only weakly orthogonal. Of course, any orthogonal (in terms of (2.46)) signatures are weakly orthogonal, but not vice versa.

For the signatures meeting (7.18), equation (7.16) becomes d2(b, b0) ¼ Eb P"2. At

k 1 k

least one of the summands in this sum is non-zero, so that dmin2 4Eb, whereby along with (7.17) dmin2 ¼ 4Eb. The implication of this is that the ensemble of K weakly

orthogonal signatures is optimal in minimum distance, and hence (asymptotically) in probability of confusion between different users’ bit patterns.

A lot of techniques exist for generating orthogonal (meeting (2.46)) spread spectrum signals for various lengths (spreading factors) N. One example is Walsh functions or, more generally, Hadamard matrices, discussed in Section 2.7.3 and providing binary orthogonal codes. Another possible option is cyclically shifted replicas of any sequence with perfect periodic ACF, e.g. ternary, polyphase etc. (see Section 6.11). Any ensemble of K0 orthogonal signatures is trivially transformed into the set of weakly orthogonal signatures containing 2K0 signals by adding quadrature replicas of any signal—a fact repeatedly referred to before (see Sections 2.5 and 4.1).

Under any specific choice of orthogonal signatures the signal space dimension strictly limits their number (and hence, number of users K) (see Section 2.5). According to (7.12), given the chip, N-dimensional vector ak ¼ (ak, 0, ak, 1, . . . , ak, N 1) of the kth code sequence exhaustively determines the kth signature, and the orthogonality of the kth and lth signatures is equivalent to the orthogonality of vectors ak, al. Indeed, repeating the derivation of (2.52) for complex envelopes (alternatively using (5.7)) allows the inner

_

_

 

 

product of Sk(t), Sl(t) to be found, as:

 

 

 

_ _

N 1

 

 

ðSk; SlÞ ¼ 2E0

X

ð7:19Þ

 

ak;ial;i ¼ 2E0ðak; alÞ

 

 

i¼0

 

confirming that the orthogonality of ak, al is necessary and sufficient for the orthogonality of S_k(t), S_l(t). Dimension N of the space of code sequence vectors ak is evidently a maximal number K0 of orthogonal signatures S_k(t). Let us stress again that when quadrature splitting of every signature is allowed, the maximal number of users accommodated within the signature ensemble is defined as K ¼ 2K 0 ¼ 2N. If, however, for some reason the accurate phase shift /2 between the quadrature copies of the same

218

Spread Spectrum and CDMA

 

 

signature cannot be maintained, weak orthogonality is insufficient, and the maximal number of users is two times smaller: K ¼ K0 ¼ N.

Note that weak orthogonality is only a sufficient but not a necessary condition of equality in (7.17) and, in particular, it is quite an interesting issue whether it is possible to achieve the upper bound in (7.17) with the number of signatures exceeding the dimension of the signal space ns. As follows from the previous reasoning, ns is either 2N or N depending on whether or not a quadrature splitting of signatures is allowed. A synchronous CDMA system in which K > ns is called oversaturated, emphasizing that the excessive number of code vectors involved excludes the chance of their orthogonality (possibly a weak one).

The opportunity and algorithm for obtaining the minimum distance equal to the upper limit (7.17) in an oversaturated system was proved in [56]. To discuss the idea more transparently and simplify the notation, let us first ignore the opportunity for doubling the signal space dimension due to a quadrature splitting, putting ns ¼ N. Let us take N orthonormal N-dimensional vectors ak, k ¼ 1, 2, . . . , N; (ak, al) ¼ kl, and add to them one more vector built as:

 

1

N

 

aNþ1

X

ð7:20Þ

 

¼ pN k¼1 ak

 

 

 

 

Using N þ 1 vectors ak, k ¼ 1, 2, . . . , N þ 1 thus obtained to form K ¼ N þ 1 signatures according to (7.12), we have the N þ 1th signature:

N

SNþ1ðtÞ ¼ p1 X S_kðtÞ

N k¼1

and, modulating all the signatures by binary data symbols bk

Nþ1

S_ðt; bÞ ¼

X

k¼1

N

X

¼

k¼1

_

 

 

 

N

_

1

 

 

 

X

bkSkðtÞ ¼

bkSkðtÞ þ pN bNþ1

 

1

 

k¼1

_

 

 

 

 

 

 

 

ðbk

þ pN bNþ1ÞSkðtÞ:

 

 

 

 

 

 

 

 

¼ 1, a group signal:

N

X S_kðtÞ

k¼1

ð7:21Þ

The difference between the two versions of the group signal corresponding to two bit patterns b ¼ (b1, b2, . . . , bNþ1), b0 ¼ (b01, b02, . . . , b0Nþ1) is:

N

S_ðt; bÞ S_ðt; b0Þ ¼ X "k þ p1 "Nþ1 S_kðtÞ; "k ¼ bk b0k ¼ 0; 2

k¼1 N

Using the same technique as in (7.15) and the orthogonality of the first N signatures, we arrive at:

d2ðb; b0Þ ¼ S_

ðt; bÞ S_ðt; b0

Þ

 

2

¼ Eb kN1

"k þ p1N "Nþ1 2

ð7:22Þ

 

 

 

 

X

 

 

 

 

 

 

 

 

 

 

 

¼

Spread spectrum signature ensembles

219

 

 

Since the bit patterns b, b0 are different, at least one of "k, k ¼ 1, 2, . . . , N þ 1 is nonzero, i.e. equals 2. If "Nþ1 ¼ 0 then such an "k is present among "1, "2, . . . , "N and

d2(b, b0)

 

b

 

Nþ1 ¼

 

2

 

 

 

 

 

 

 

 

k ¼

 

2

 

 

4E

. If "

 

 

 

2, then the summands in (7.22) with "

 

0 equal 4/N,

while all the

rest are

4(pN 1) /N, resulting

in

d2(b, b0) 4Eb min 1, (pN 1) .

Combining these results

we come to the estimate of the minimum squared distance

 

 

 

 

 

 

 

 

 

 

 

 

 

 

from below:

 

 

 

 

 

 

pN 1

 

 

8

 

 

 

 

 

 

 

 

 

 

 

dmin2

min

4Eb; 4

Eb

¼

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2

 

<

4

pN

 

2Eb; N < 4

 

 

 

 

 

 

 

 

 

 

 

4Eb; N

 

4

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

:

 

 

 

 

 

 

 

 

Comparing this with (7.17) shows the possibility of adding one extra signature to the N orthogonal ones without sacrificing the minimum distance, whenever N 4. Generalization of this idea underlies the following procedure of building an optimal oversaturated signature ensemble [56,57]. Let vectors a00, a01, . . . , a0N 1 be an orthonormal basis of N-dimensional space where N ¼ 4l, l is natural. Let us use them as codes of N primary signatures. We arrange oversaturating supplementary signatures as an l-layer procedure. Supplementary signature code sequences of the sth layer are:

as

1

3

as 1

1

4s 1 a0s

; k 0; 1; . . . ; N

1; s 1; 2; . . . ; l

7:23

k ¼

 

X

4kþm ¼

 

X

4 kþm

¼

 

 

¼

ð Þ

2

m¼0

2s

m¼0

4s

In other words, in the first layer of supplementary signatures we perform splitting of

the basic set a00, a01, . . . , a0N 1 into 4l 1 groups each containing four primary signatures. The linear combination (7.20) (where N ¼ 4) of these four basic signatures is added to their group, producing the total of N þ N/4 signatures. At the second layer we split all supplementary signatures of the first layer the same way into groups of four and introduce again in each group linear combinations (7.20), and so forth. The tree in Figure 7.14 illustrates the whole procedure. Then there are 4l 1 supplementary signatures at the first layer, 4l 2 at the second and generally 4l s at the sth layer totalling:

4l 1 þ 4l 2 þ þ 4 þ 1 ¼ 4l 1 ¼ N 1 3 3

supplementary signatures, or—together with the primary ones identified with a layer zero—an overall number of signatures:

K ¼ 4N3 1 ¼

43

 

 

 

 

N

Since norms of all vectors (7.23) remain equal to one, supplementary signatures preserve the same energy per bit Eb as the primary ones.

220

 

 

 

 

 

 

 

 

Spread Spectrum and CDMA

a00

 

 

 

 

a10

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a01

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a02

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a03

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a04

 

 

 

 

 

 

2

 

 

 

 

 

 

 

 

 

 

 

 

a05

 

 

 

 

a11

 

a0

 

a0l

 

 

 

 

a06

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a07

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a2

 

 

 

 

 

a0N−4

 

 

 

 

a13

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a0N−3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

a0N−2

 

 

 

aN1

– 1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

4

 

 

 

 

 

a0N−1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Figure 7.14 Constructing an oversaturated signature set

Let S_sk(t) and bsk be the complex envelope of the kth signature on the sth layer and the user’s bit transmitted by this signature, respectively. Then composing a group signal similarly to (7.21) leads to:

 

 

 

 

N 1

 

 

 

 

N4 1

 

 

 

 

 

N

1

 

 

 

 

 

 

l 4Ns 1

 

 

 

 

_

 

 

 

0

_0

 

 

1

_1

 

 

 

4l 1

l 1

_l 1

 

l _l

 

 

s

_s

 

 

S

t; b

Þ ¼

X

 

S

 

 

Þ þ

X

 

S

 

 

 

 

X

 

 

S

 

 

 

S

 

 

Þ ¼

X X

 

S

 

 

Þ

 

b

k

t

 

b

k

t

 

 

 

b

k

t

b

0

t

 

b

k

t

 

ð

 

k¼0

k

 

ð

k¼0

k

 

ð Þ þ þ

 

k

 

 

ð Þ þ

0

 

ð

s¼0 k¼0

k

 

ð

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

k¼0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

which after substituting (7.23) turns into:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

l

1

4Ns 1

4s 1

 

 

 

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

_

 

 

X

 

X X

 

s

_

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Sðt; bÞ ¼ s¼0

2s

k¼0 m¼0 bkS4skþmðtÞ

 

 

 

 

 

 

 

 

 

 

 

The double sum in k, m here contains N summands independently of s. It can be rearranged into a single sum after changing the summation index as:

 

 

 

 

 

 

 

 

 

 

4sk þ m ¼ n ) k ¼ j4sk

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

n

 

 

 

 

 

 

 

 

 

 

leading to (with redesignation n ! k):

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

S_

ð

t; b

Þ ¼ s¼0

2s

k¼0 b4sc

S_0

ð

Þ ¼ k¼0

þ 2 b4c þ þ

2l 1

 

4l 1

 

þ 2l

 

ð

Þ

 

l

1

N 1 bs k

t

N 1

b0

 

1 b1 k

1

bl 1

 

 

1 bl

S_0

t

 

 

 

 

X

 

X

k

 

X

k

 

 

 

 

 

 

k

 

 

 

0

k

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Spread spectrum signature ensembles

221

 

 

Then the squared distance between the group signals corresponding to different bit patterns generalizes (7.22) as:

d2

ð

b; b0

Þ ¼

Eb

k 0

 

þ 2

b4c

þ þ 2l 1

4l 1

 

þ 2l

"l

 

2

ð

7:24

Þ

 

 

N 1

"0

1

"1 k

1

"l 1

 

1

 

 

 

 

 

 

 

 

X

k

 

 

 

 

k

 

 

0

 

 

 

 

 

¼

where, as before, "sn ¼ 0, 2 is the difference of bits transmitted on the signature S_sk(t) in the user’s bit patterns b, b0. If all "sm, s > 0 are zeros (bits of b, b0 on all the supplementary signatures are identical), then at least one of "0k equals 2 and d2(b, b0) 4Eb. If u is a maximal layer number for which "um ¼ 2, u > 0, then a summand of (7.24) containing "um may be presented as:

1

2ux0

2u 1x1

2xu 1

1

2

4u 1

 

 

 

 

 

 

 

where xs ¼ "sn/2 ¼ 0, 1, s ¼ 0, 1, . . . , u 1. The number in the round brackets of the modulus above is always even so the squared modulus is never smaller than one. Since there are exactly 4u terms in (7.24) entered by "um with any fixed m, we come to an estimation d2(b, b0) 4uEb/4u 1 ¼ 4Eb, proving that the oversaturated ensemble of this sort does not reduce the minimum distance of the primary orthogonal set.

In its general form the procedure described does not guarantee that the supplementary code sequences (7.23) obtained from the binary primary sequences will also be binary. To meet this latter demand, a version of the procedure may be used [57] in which primary sequences are generated as rows of the lth Kronecker power of the 4th order Hadamard matrix having an odd number of plus ones in any column.

Example 7.2.1. Let us build up an oversaturated ensemble of binary signatures of length N ¼ 16 ¼ 42. According to the scheme just discussed, 5 supplementary orthogonal signatures may be added to the N ¼ 16 primary ones (four at layer s ¼ 1 and one at layer s ¼ 2) providing total number of users K ¼ 21. In order to have all signatures binary take the Hadamard matrix:

23

þþ þ þ

H4

6

 

 

þ

þ

7

¼

þ

 

þ

 

 

6

 

 

 

 

7

 

4

þ

 

 

þ

5

having one or three plus ones in its columns and form its Kronecker square:

H16

H4 H4

 

2

H4

¼

 

¼

6

H4

H4

 

 

 

6

 

 

 

 

4

H4

 

 

 

 

H4

H4

H4

3

H4

H4

H4

7

H4

 

H4

H4

H4

H4

H4

7

 

 

 

 

5

222

Spread Spectrum and CDMA

 

 

Primary signatures are just rows of this matrix, i.e. in the normalized form:

a00; a01; a02; a03; a04; a05; a06; a07; a08; a09; a010; a011; a012; a013; a014; a015 T¼

 

 

 

 

0 þ þ þ þ þ þ þ þ þ þ þ þ þ þ þ þ 1

 

 

 

 

B

þ þ þ þ þ þ þ þ

 

 

 

 

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

1 B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

¼

 

B

 

 

C

 

4

 

 

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

þ þ þ þ þ þ þ þ C

 

 

 

 

B

 

 

C

 

 

 

 

B

 

 

C

 

 

 

 

@

 

 

A

 

 

 

 

 

 

þ þ þ þ þ þ þ þ

Applying (7.23) to the rows of this matrix gives five supplementary binary signatures:

 

a1

 

 

 

 

 

 

þ þ þ þ þ þ þ þ þ þ þ þ

 

0

 

 

 

 

 

 

 

a1

 

 

 

 

 

 

 

1

1

 

1

0 þ þ þ þ þ þ þ þ 1

0 a1

 

 

 

 

2

C

¼ 4 B

þ þ þ þ þ þ þ þ C

B a1

B

3

C

 

 

 

B

C

B a2

C B

þ þ þ þ þ þ þ þ C

B

0

C

 

 

 

B

C

@

 

A @ þ þ þ þ þ þ þ þ þ þ A

It may be quite a challenge for the reader to check the minimum distance property of this oversaturated ensemble.

Let us remind ourselves that the criterion of minimum distance is adequate (at least asymptotically) whenever multiuser reception is affordable. Up to this point we have not worried about the multiuser receiver complexity. For the case of non-oversaturated systems (K N) this is not a critical matter, since—the orthogonal ensemble being optimal—multiuser reception degenerates in this case to a single-user one (see Section 4.1). On the other hand, when an oversaturated system is analysed, the opportunities for simplifying the multiuser algorithm at the cost of proper design of signatures are very important. One way to realize this approach again exploits the idea of splitting the overall N-dimensional signal space into orthogonal subspaces of smaller dimension n. However, in contrast with what was discussed above, every subspace is further