
- •Contents
- •Preface
- •1 Spread spectrum signals and systems
- •1.1 Basic definition
- •1.2 Historical sketch
- •2 Classical reception problems and signal design
- •2.1 Gaussian channel, general reception problem and optimal decision rules
- •2.2 Binary data transmission (deterministic signals)
- •2.3 M-ary data transmission: deterministic signals
- •2.4 Complex envelope of a bandpass signal
- •2.5 M-ary data transmission: noncoherent signals
- •2.6 Trade-off between orthogonal-coding gain and bandwidth
- •2.7 Examples of orthogonal signal sets
- •2.7.1 Time-shift coding
- •2.7.2 Frequency-shift coding
- •2.7.3 Spread spectrum orthogonal coding
- •2.8 Signal parameter estimation
- •2.8.1 Problem statement and estimation rule
- •2.8.2 Estimation accuracy
- •2.9 Amplitude estimation
- •2.10 Phase estimation
- •2.11 Autocorrelation function and matched filter response
- •2.12 Estimation of the bandpass signal time delay
- •2.12.1 Estimation algorithm
- •2.12.2 Estimation accuracy
- •2.13 Estimation of carrier frequency
- •2.14 Simultaneous estimation of time delay and frequency
- •2.15 Signal resolution
- •2.16 Summary
- •Problems
- •Matlab-based problems
- •3 Merits of spread spectrum
- •3.1 Jamming immunity
- •3.1.1 Narrowband jammer
- •3.1.2 Barrage jammer
- •3.2 Low probability of detection
- •3.3 Signal structure secrecy
- •3.4 Electromagnetic compatibility
- •3.5 Propagation effects in wireless systems
- •3.5.1 Free-space propagation
- •3.5.2 Shadowing
- •3.5.3 Multipath fading
- •3.5.4 Performance analysis
- •3.6 Diversity
- •3.6.1 Combining modes
- •3.6.2 Arranging diversity branches
- •3.7 Multipath diversity and RAKE receiver
- •Problems
- •Matlab-based problems
- •4 Multiuser environment: code division multiple access
- •4.1 Multiuser systems and the multiple access problem
- •4.2 Frequency division multiple access
- •4.3 Time division multiple access
- •4.4 Synchronous code division multiple access
- •4.5 Asynchronous CDMA
- •4.6 Asynchronous CDMA in the cellular networks
- •4.6.1 The resource reuse problem and cellular systems
- •4.6.2 Number of users per cell in asynchronous CDMA
- •Problems
- •Matlab-based problems
- •5 Discrete spread spectrum signals
- •5.1 Spread spectrum modulation
- •5.2 General model and categorization of discrete signals
- •5.3 Correlation functions of APSK signals
- •5.4 Calculating correlation functions of code sequences
- •5.5 Correlation functions of FSK signals
- •5.6 Processing gain of discrete signals
- •Problems
- •Matlab-based problems
- •6 Spread spectrum signals for time measurement, synchronization and time-resolution
- •6.1 Demands on ACF: revisited
- •6.2 Signals with continuous frequency modulation
- •6.3 Criterion of good aperiodic ACF of APSK signals
- •6.4 Optimization of aperiodic PSK signals
- •6.5 Perfect periodic ACF: minimax binary sequences
- •6.6 Initial knowledge on finite fields and linear sequences
- •6.6.1 Definition of a finite field
- •6.6.2 Linear sequences over finite fields
- •6.6.3 m-sequences
- •6.7 Periodic ACF of m-sequences
- •6.8 More about finite fields
- •6.9 Legendre sequences
- •6.10 Binary codes with good aperiodic ACF: revisited
- •6.11 Sequences with perfect periodic ACF
- •6.11.1 Binary non-antipodal sequences
- •6.11.2 Polyphase codes
- •6.11.3 Ternary sequences
- •6.12 Suppression of sidelobes along the delay axis
- •6.12.1 Sidelobe suppression filter
- •6.12.2 SNR loss calculation
- •6.13 FSK signals with optimal aperiodic ACF
- •Problems
- •Matlab-based problems
- •7 Spread spectrum signature ensembles for CDMA applications
- •7.1 Data transmission via spread spectrum
- •7.1.1 Direct sequence spreading: BPSK data modulation and binary signatures
- •7.1.2 DS spreading: general case
- •7.1.3 Frequency hopping spreading
- •7.2 Designing signature ensembles for synchronous DS CDMA
- •7.2.1 Problem formulation
- •7.2.2 Optimizing signature sets in minimum distance
- •7.2.3 Welch-bound sequences
- •7.3 Approaches to designing signature ensembles for asynchronous DS CDMA
- •7.4 Time-offset signatures for asynchronous CDMA
- •7.5 Examples of minimax signature ensembles
- •7.5.1 Frequency-offset binary m-sequences
- •7.5.2 Gold sets
- •7.5.3 Kasami sets and their extensions
- •7.5.4 Kamaletdinov ensembles
- •Problems
- •Matlab-based problems
- •8 DS spread spectrum signal acquisition and tracking
- •8.1 Acquisition and tracking procedures
- •8.2 Serial search
- •8.2.1 Algorithm model
- •8.2.2 Probability of correct acquisition and average number of steps
- •8.2.3 Minimizing average acquisition time
- •8.3 Acquisition acceleration techniques
- •8.3.1 Problem statement
- •8.3.2 Sequential cell examining
- •8.3.3 Serial-parallel search
- •8.3.4 Rapid acquisition sequences
- •8.4 Code tracking
- •8.4.1 Delay estimation by tracking
- •8.4.2 Early–late DLL discriminators
- •8.4.3 DLL noise performance
- •Problems
- •Matlab-based problems
- •9 Channel coding in spread spectrum systems
- •9.1 Preliminary notes and terminology
- •9.2 Error-detecting block codes
- •9.2.1 Binary block codes and detection capability
- •9.2.2 Linear codes and their polynomial representation
- •9.2.3 Syndrome calculation and error detection
- •9.2.4 Choice of generator polynomials for CRC
- •9.3 Convolutional codes
- •9.3.1 Convolutional encoder
- •9.3.2 Trellis diagram, free distance and asymptotic coding gain
- •9.3.3 The Viterbi decoding algorithm
- •9.3.4 Applications
- •9.4 Turbo codes
- •9.4.1 Turbo encoders
- •9.4.2 Iterative decoding
- •9.4.3 Performance
- •9.4.4 Applications
- •9.5 Channel interleaving
- •Problems
- •Matlab-based problems
- •10 Some advancements in spread spectrum systems development
- •10.1 Multiuser reception and suppressing MAI
- •10.1.1 Optimal (ML) multiuser rule for synchronous CDMA
- •10.1.2 Decorrelating algorithm
- •10.1.3 Minimum mean-square error detection
- •10.1.4 Blind MMSE detector
- •10.1.5 Interference cancellation
- •10.1.6 Asynchronous multiuser detectors
- •10.2 Multicarrier modulation and OFDM
- •10.2.1 Multicarrier DS CDMA
- •10.2.2 Conventional MC transmission and OFDM
- •10.2.3 Multicarrier CDMA
- •10.2.4 Applications
- •10.3 Transmit diversity and space–time coding in CDMA systems
- •10.3.1 Transmit diversity and the space–time coding problem
- •10.3.2 Efficiency of transmit diversity
- •10.3.3 Time-switched space–time code
- •10.3.4 Alamouti space–time code
- •10.3.5 Transmit diversity in spread spectrum applications
- •Problems
- •Matlab-based problems
- •11 Examples of operational wireless spread spectrum systems
- •11.1 Preliminary remarks
- •11.2 Global positioning system
- •11.2.1 General system principles and architecture
- •11.2.2 GPS ranging signals
- •11.2.3 Signal processing
- •11.2.4 Accuracy
- •11.2.5 GLONASS and GNSS
- •11.2.6 Applications
- •11.3 Air interfaces cdmaOne (IS-95) and cdma2000
- •11.3.1 Introductory remarks
- •11.3.2 Spreading codes of IS-95
- •11.3.3 Forward link channels of IS-95
- •11.3.3.1 Pilot channel
- •11.3.3.2 Synchronization channel
- •11.3.3.3 Paging channels
- •11.3.3.4 Traffic channels
- •11.3.3.5 Forward link modulation
- •11.3.3.6 MS processing of forward link signal
- •11.3.4 Reverse link of IS-95
- •11.3.4.1 Reverse link traffic channel
- •11.3.4.2 Access channel
- •11.3.4.3 Reverse link modulation
- •11.3.5 Evolution of air interface cdmaOne to cdma2000
- •11.4 Air interface UMTS
- •11.4.1 Preliminaries
- •11.4.2 Types of UMTS channels
- •11.4.3 Dedicated physical uplink channels
- •11.4.4 Common physical uplink channels
- •11.4.5 Uplink channelization codes
- •11.4.6 Uplink scrambling
- •11.4.7 Mapping downlink transport channels to physical channels
- •11.4.8 Downlink physical channels format
- •11.4.9 Downlink channelization codes
- •11.4.10 Downlink scrambling codes
- •11.4.11 Synchronization channel
- •11.4.11.1 General structure
- •11.4.11.2 Primary synchronization code
- •11.4.11.3 Secondary synchronization code
- •References
- •Index

214 |
Spread Spectrum and CDMA |
|
|
bit and f1 þ Fi for a data bit equal to one. Figure 7.12b shows this for the bit stream 00101101. The principal difference between fast and slow FH is now seen: the latter does not spread the spectrum of an individual data symbol, widening just the total bandwidth occupied by the system. It looks like a system that merely switches from one operational frequency to another from time to time but within a fixed group of data symbols no switching happens. At the receiving end down-conversion to an intermediate frequency fi is accomplished with the aid of a reference signal repeating the signature frequency pattern (with an appropriate delay) on the carrier f0 fi (Figure 7.12c). This returns the waveform to the bandwidth inherent to a plain (non-frequency-hopping) FSK data modulation (Figure 7.12d), so that an ordinary FSK demodulator may restore the transmitted data (Figure 7.12c).
The techniques illustrated in the examples above for binary data transmission are easily extended to a general FSK data modulation (see Problems 7.5–7.7).
FH spreading has some features that make it especially attractive for military applications, in particular in various antagonistic scenarios of games against jamming systems [3,6]. At the same time, its commercial use had not until recently been significant, at least as regards fast FH. However, the advent of Bluetooth technology [55] indicates that this kind of spread spectrum may also possess good commercial prospects.
7.2 Designing signature ensembles for synchronous DS CDMA
7.2.1 Problem formulation
Consider a K-user DS CDMA system where all user datastreams and all signatures are strictly synchronized, i.e. have zero mutual time shifts, at the receiver input. As was pointed out in Section 4.4, a classical example of such a system is the downlink of CDMA mobile radio, where the base station controls entirely the timing of signals addressed to all users within the cell. Certainly, the group signal arrives at the mobile receiver preserving the initial synchronism between the signals sent to different individual users. In our current analysis we will operate with an idealized channel model, in which multipath delay spread max is smaller than the chip period D of users’ signatures, or an efficient equalizing is used, eliminating all the multipath components whose delays exceed D. This allows us to ignore any potential violations of perfect synchronism of components in a received signal.
In accordance with the concept of DS spreading, the complex envelope of a received group signal S_(t; b1, b2, . . . , bK ) is the sum in k of signature complex envelopes manipulated by users’ datastreams, each of them being defined by (7.6). Generally, each user’s signals may have its individual amplitude; however, we will restrict ourselves to the simplest case of equal intensities. Since the assumption of perfect synchronism permits us to set all delays k and initial phases k in (7.7) equal to zero, we then arrive at the expression of the received complex envelope (subscript r discarded as needless now):
|
|
|
K |
|
|
_ |
|
|
X |
_ |
|
Sðt; b1 |
; b2 |
; . . . ; bK Þ ¼ |
BkðtÞSkðtÞ |
ð7:10Þ |
k¼1

Spread spectrum signature ensembles |
|
215 |
|||||||||
|
|
|
|
|
|
|
|
||||
b1,i – 1 |
|
|
|
b1,i |
|
|
b1,i + 1 |
||||
1st user |
a1,0 |
a1,1 |
a1,2 |
|
|
|
a1,N – 2 |
a1,N–1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
b2,i – 1 |
|
|
|
b2,i |
|
|
b2,i + 1 t |
||||
2nd user |
a2,0 |
a2,1 |
a2,2 |
|
|
|
a2,N – 2 |
a2,N–1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
t |
bK,i – 1 |
|
|
|
bK,i |
|
|
bK,i + 1 |
||||
Kth user |
aK,0 |
aK,1 |
aK,2 |
|
|
|
aK,N – 2 |
aK,N – 1 |
|
|
|
|
|
∆ |
|
|
N∆ |
|
|
|
t |
||
|
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
Figure 7.13 Data symbol and chip alignment in synchronous CDMA
Let us focus on a single data symbol interval of duration T. Again, due to the complete synchronism the current data symbols of all users start and end strictly simultaneously. With bk being the kth user’s current data symbol, (7.10) during a single symbol interval may be written as follows:
|
K |
|
|
_ |
X |
_ |
ð7:11Þ |
Sðt; bÞ ¼ |
|
bkSkðtÞ |
k¼1
where b ¼ (b1, b2, . . . , bK ) is the K-dimensional vector of current data symbols of all users. Remember now that every signature in the DS CDMA system is an APSK signal
described by the model (5.2):
_ |
N 1 |
_ |
|
SðtÞ ¼ |
X |
ak;iS0ðt iDÞ |
ð7:12Þ |
|
i¼0
where fak, 0, ak, 1, . . . ak, N 1g is a code sequence, manipulating chips of the kth signature, and N is a spreading factor, i.e. the number of chips per one data symbol. Figure 7.13 emphasizes the strong mutual alignment between signature chips and boundaries of transmitted data symbols characteristic of synchronous CDMA.
Based on (7.11) and (7.12), several approaches to designing signature ensembles for synchronous DS CDMA networks may be formulated. Among the main factors influencing the procedure and results of the signature set optimization is the relation between the number of users K and spreading factor N, as well as the receiver algorithm (multiuser or conventional).
7.2.2 Optimizing signature sets in minimum distance
Suppose that the receiver of any complexity is admissible and, therefore, we are allowed to use the optimal (multiuser) algorithm of estimating the data vector b based on the search for the value of b minimizing the distance between observation y(t) and the candidate group signal s(t; b) (see Section 4.1). In terms of the complex envelope this means

216 |
|
|
|
|
|
|
|
Spread Spectrum and CDMA |
||
|
|
|
|
|
|
|
|
|
|
|
minimization in b of the squared distance |
|
_ |
_ |
|
2 |
, where |
_ |
|||
|
Y(t) S(t; b) |
|
|
S(t; b) is given by |
||||||
signatures fS1(t), S2(t), . . . , SK (t)g |
|
|
|
|
|
|
||||
(7.11). Then a solid theoretical motivation is evident |
towards finding the ensemble of K |
|||||||||
|
|
|
|
^ |
||||||
_ |
_ |
_ |
|
|
|
|
|
|
|
|
|
|
|
minimizing the probability of error in the estimate b of |
a K-user data vector b ¼ (b1, b2, . . . , bK ). Returning to the material of Section 2.3, let us recollect that asymptotically (with SNR sufficiently high), minimizing the error probability is equivalent to maximizing the minimum distance in the constellation of M transmitted signals. In the studied case the alternative signals to be distinguished are copies of (7.11) corresponding to different data vectors b. Hence, we may formulate the problem of optimizing the signature set as maximization of the minimum squared distance:
|
|
|
|
|
|
|
d2 |
min d2 |
ð |
b; b0 |
Þ ¼ |
max |
|
|
|
ð |
7:13 |
Þ |
||||
|
|
|
|
|
|
|
min ¼ |
|
b;b0 |
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
b b0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6¼ |
|
|
|
|
|
|
|
|
|
|
|
|
|
where the minimum distance dmin is found over all different |
pairs of data vectors |
|||||||||||||||||||||
b |
¼ |
(b1 |
, b2 |
, . . . , bK ), b0 |
¼ |
(b0 |
, b0 , . . . , b0 |
), b |
|
b0 and (see (2.43)): |
|
|
|
|
|
|||||||
|
|
|
|
1 |
2 |
K |
|
6¼ |
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
|
d2ðb; b0 |
Þ ¼ ksðt; bÞ sðt; b0Þk2¼ |
1 |
|
|
ðt; b0Þ |
2 |
ð7:14Þ |
|||||||||||
|
|
|
|
2 S_ðt; bÞ S_ |
|
|||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Let us study in more detail binary data transmission when the data symbols are bits transmitted directly by BPSK so that bk, b0k ¼ 1, k ¼ 1, 2, . . . , K. This narrowing of the scope makes the analysis a bit easier, subsequent spreading to a general PSK being straightforward. Then using (7.11), (2.41) and (2.42) in (7.14) results in:
d2ðb; b0Þ ¼ 2 k 1 |
"kS_kðtÞ |
¼ |
2 Z |
k 1 "kS_kðtÞ |
dt ¼ Eb |
k 1 l 1 "k"l kl |
|
|
ð7:15Þ |
||||||||||||||
|
|
|
K |
|
2 |
|
|
T |
|
K |
|
|
2 |
K |
K |
|
|
|
|
|
|
|
|
1 |
X |
|
|
1 |
|
X |
|
|
X X |
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Eb ¼ |
1 |
|
T |
|
_ |
|
|
||
where "k ¼ bk bk0 takes on one of three possible values: 0 or 2; |
2 |
|
0 |
|
Sk(t) dt is |
||||||||||||||||||
the energy of the kth signature used for transmitting one bit, these |
energies for all K |
||||||||||||||||||||||
|
|
R |
|
|
|
|
|
||||||||||||||||
users assumed the same, and: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
|
T |
S_kðtÞS_kðtÞ dt |
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
kl ¼ 2Eb Z0 |
|
|
|
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
is the correlation coefficient between the complex envelopes of the kth and lth signatures. Using properties of the correlation coefficients seen from its definition,kk ¼ 1, kl ¼ lk (7.15) takes the form explicitly showing that distance is always real:
K |
K 1 K |
|
X |
X X |
ð7:16Þ |
d2ðb; b0Þ ¼ Eb "k2 þ 2Eb |
"k"lReð klÞ |
|
k¼1 |
k¼1 l¼kþ1 |
|
Take two data vectors (bit patterns) b, b0 differing in only one, for instance the first, component. Then "k ¼ 0, k ¼ 2, 3, . . . , K, "1 ¼ 2 and from (7.16) d2(b, b0) ¼ 4Eb. Since dmin2 is never greater than the squared distance for any specific pair of b, b0:
dmin2 4Eb |
ð7:17Þ |

Spread spectrum signature ensembles |
217 |
|
|
This upper bound tells us that a signature ensemble, for which dmin2 ¼ 4Eb, should be treated as optimal according to the criterion of maximum minimum distance (7.13). One of the sufficient conditions of achieving the bound (7.17) is the weak orthogonality of complex envelopes of signatures:
Reð klÞ ¼ |
( 0; k |
¼ l |
¼ kl |
ð7:18Þ |
|
1; k |
l |
|
|
|
|
6¼ |
|
|
The reason why complex envelopes satisfying (7.18) are called weakly orthogonal becomes clear after comparison of (7.18) and (2.46) ( kl ¼ kl). The latter is much more demanding and forces the signals sk(t), sl(t) with the complex envelopes S_k(t), S_l(t) to preserve orthogonality under any mutual phase shifts. At the same time, two signals modulated by S_(t) and S_(t) exp [j( /2)] ¼ jS_(t), i.e. just quadrature (phase shifted by /2) replicas of the same signal, are orthogonal, but lose orthogonality if their mutual phase shift differs from /2. Hence, S_(t) and jS_(t) are only weakly orthogonal. Of course, any orthogonal (in terms of (2.46)) signatures are weakly orthogonal, but not vice versa.
For the signatures meeting (7.18), equation (7.16) becomes d2(b, b0) ¼ Eb PK¼ "2. At
k 1 k
least one of the summands in this sum is non-zero, so that dmin2 4Eb, whereby along with (7.17) dmin2 ¼ 4Eb. The implication of this is that the ensemble of K weakly
orthogonal signatures is optimal in minimum distance, and hence (asymptotically) in probability of confusion between different users’ bit patterns.
A lot of techniques exist for generating orthogonal (meeting (2.46)) spread spectrum signals for various lengths (spreading factors) N. One example is Walsh functions or, more generally, Hadamard matrices, discussed in Section 2.7.3 and providing binary orthogonal codes. Another possible option is cyclically shifted replicas of any sequence with perfect periodic ACF, e.g. ternary, polyphase etc. (see Section 6.11). Any ensemble of K0 orthogonal signatures is trivially transformed into the set of weakly orthogonal signatures containing 2K0 signals by adding quadrature replicas of any signal—a fact repeatedly referred to before (see Sections 2.5 and 4.1).
Under any specific choice of orthogonal signatures the signal space dimension strictly limits their number (and hence, number of users K) (see Section 2.5). According to (7.12), given the chip, N-dimensional vector ak ¼ (ak, 0, ak, 1, . . . , ak, N 1) of the kth code sequence exhaustively determines the kth signature, and the orthogonality of the kth and lth signatures is equivalent to the orthogonality of vectors ak, al. Indeed, repeating the derivation of (2.52) for complex envelopes (alternatively using (5.7)) allows the inner
_ |
_ |
|
|
product of Sk(t), Sl(t) to be found, as: |
|
|
|
|
_ _ |
N 1 |
|
|
ðSk; SlÞ ¼ 2E0 |
X |
ð7:19Þ |
|
ak;ial;i ¼ 2E0ðak; alÞ |
||
|
|
i¼0 |
|
confirming that the orthogonality of ak, al is necessary and sufficient for the orthogonality of S_k(t), S_l(t). Dimension N of the space of code sequence vectors ak is evidently a maximal number K0 of orthogonal signatures S_k(t). Let us stress again that when quadrature splitting of every signature is allowed, the maximal number of users accommodated within the signature ensemble is defined as K ¼ 2K 0 ¼ 2N. If, however, for some reason the accurate phase shift /2 between the quadrature copies of the same

218 |
Spread Spectrum and CDMA |
|
|
signature cannot be maintained, weak orthogonality is insufficient, and the maximal number of users is two times smaller: K ¼ K0 ¼ N.
Note that weak orthogonality is only a sufficient but not a necessary condition of equality in (7.17) and, in particular, it is quite an interesting issue whether it is possible to achieve the upper bound in (7.17) with the number of signatures exceeding the dimension of the signal space ns. As follows from the previous reasoning, ns is either 2N or N depending on whether or not a quadrature splitting of signatures is allowed. A synchronous CDMA system in which K > ns is called oversaturated, emphasizing that the excessive number of code vectors involved excludes the chance of their orthogonality (possibly a weak one).
The opportunity and algorithm for obtaining the minimum distance equal to the upper limit (7.17) in an oversaturated system was proved in [56]. To discuss the idea more transparently and simplify the notation, let us first ignore the opportunity for doubling the signal space dimension due to a quadrature splitting, putting ns ¼ N. Let us take N orthonormal N-dimensional vectors ak, k ¼ 1, 2, . . . , N; (ak, al) ¼ kl, and add to them one more vector built as:
|
1 |
N |
|
|
aNþ1 |
X |
ð7:20Þ |
||
|
||||
¼ pN k¼1 ak |
||||
|
|
|
|
Using N þ 1 vectors ak, k ¼ 1, 2, . . . , N þ 1 thus obtained to form K ¼ N þ 1 signatures according to (7.12), we have the N þ 1th signature:
N
SNþ1ðtÞ ¼ p1 X S_kðtÞ
N k¼1
and, modulating all the signatures by binary data symbols bk
Nþ1
S_ðt; bÞ ¼
X
k¼1
N
X
¼
k¼1
_ |
|
|
|
N |
_ |
1 |
|
|
|
X |
|||
bkSkðtÞ ¼ |
bkSkðtÞ þ pN bNþ1 |
|||||
|
1 |
|
k¼1 |
_ |
|
|
|
|
|
|
|
|
|
ðbk |
þ pN bNþ1ÞSkðtÞ: |
|
||||
|
|
|
|
|
|
|
¼ 1, a group signal:
N
X S_kðtÞ
k¼1
ð7:21Þ
The difference between the two versions of the group signal corresponding to two bit patterns b ¼ (b1, b2, . . . , bNþ1), b0 ¼ (b01, b02, . . . , b0Nþ1) is:
N
S_ðt; bÞ S_ðt; b0Þ ¼ X "k þ p1 "Nþ1 S_kðtÞ; "k ¼ bk b0k ¼ 0; 2
k¼1 N
Using the same technique as in (7.15) and the orthogonality of the first N signatures, we arrive at:
d2ðb; b0Þ ¼ S_ |
ðt; bÞ S_ðt; b0 |
Þ |
|
2 |
¼ Eb kN1 |
"k þ p1N "Nþ1 2 |
ð7:22Þ |
||
|
|
|
|
X |
|
||||
|
|
|
|
|
|
|
|
|
|
¼

Spread spectrum signature ensembles |
219 |
|
|
Since the bit patterns b, b0 are different, at least one of "k, k ¼ 1, 2, . . . , N þ 1 is nonzero, i.e. equals 2. If "Nþ1 ¼ 0 then such an "k is present among "1, "2, . . . , "N and
d2(b, b0) |
|
b |
|
Nþ1 ¼ |
|
2 |
|
|
|
|
|
|
|
|
k ¼ |
|
2 |
|
|||
|
4E |
. If " |
|
|
|
2, then the summands in (7.22) with " |
|
0 equal 4/N, |
|||||||||||||
while all the |
rest are |
4(pN 1) /N, resulting |
in |
d2(b, b0) 4Eb min 1, (pN 1) . |
|||||||||||||||||
Combining these results |
we come to the estimate of the minimum squared distance |
||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||
from below: |
|
|
|
|
|
|
pN 1 |
|
|
8 |
|
|
|
|
|
|
|
|
|
||
|
|
dmin2 |
min |
4Eb; 4 |
Eb |
¼ |
|
1 |
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
2 |
|
< |
4 |
pN |
|
2Eb; N < 4 |
|
|
|||
|
|
|
|
|
|
|
|
|
4Eb; N |
|
4 |
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
: |
|
|
|
|
|
|
|
|
Comparing this with (7.17) shows the possibility of adding one extra signature to the N orthogonal ones without sacrificing the minimum distance, whenever N 4. Generalization of this idea underlies the following procedure of building an optimal oversaturated signature ensemble [56,57]. Let vectors a00, a01, . . . , a0N 1 be an orthonormal basis of N-dimensional space where N ¼ 4l, l is natural. Let us use them as codes of N primary signatures. We arrange oversaturating supplementary signatures as an l-layer procedure. Supplementary signature code sequences of the sth layer are:
as |
1 |
3 |
as 1 |
1 |
4s 1 a0s |
; k 0; 1; . . . ; N |
1; s 1; 2; . . . ; l |
7:23 |
|||
k ¼ |
|
X |
4kþm ¼ |
|
X |
4 kþm |
¼ |
|
|
¼ |
ð Þ |
2 |
m¼0 |
2s |
m¼0 |
4s |
In other words, in the first layer of supplementary signatures we perform splitting of
the basic set a00, a01, . . . , a0N 1 into 4l 1 groups each containing four primary signatures. The linear combination (7.20) (where N ¼ 4) of these four basic signatures is added to their group, producing the total of N þ N/4 signatures. At the second layer we split all supplementary signatures of the first layer the same way into groups of four and introduce again in each group linear combinations (7.20), and so forth. The tree in Figure 7.14 illustrates the whole procedure. Then there are 4l 1 supplementary signatures at the first layer, 4l 2 at the second and generally 4l s at the sth layer totalling:
4l 1 þ 4l 2 þ þ 4 þ 1 ¼ 4l 1 ¼ N 1 3 3
supplementary signatures, or—together with the primary ones identified with a layer zero—an overall number of signatures:
K ¼ 4N3 1 ¼ |
43 |
|||
|
|
|
|
N |
Since norms of all vectors (7.23) remain equal to one, supplementary signatures preserve the same energy per bit Eb as the primary ones.

220 |
|
|
|
|
|
|
|
|
Spread Spectrum and CDMA |
||
a00 |
|
|
|
|
a10 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
a01 |
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
||||
a02 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
a03 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
a04 |
|
|
|
|
|
|
2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
a05 |
|
|
|
|
a11 |
|
a0 |
|
a0l |
||
|
|
|
|
||||||||
a06 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
a07 |
|
1 |
|
|
|
|
|
||||
|
|
|
|
|
|
||||||
|
|
|
|
|
a2 |
|
|
|
|
|
|
a0N−4 |
|
|
|
|
a13 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
a0N−3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
a0N−2 |
|
|
|
aN1 |
– 1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
4 |
|
|
|
|
|
|||
a0N−1 |
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
|
|
Figure 7.14 Constructing an oversaturated signature set
Let S_sk(t) and bsk be the complex envelope of the kth signature on the sth layer and the user’s bit transmitted by this signature, respectively. Then composing a group signal similarly to (7.21) leads to:
|
|
|
|
N 1 |
|
|
|
|
N4 1 |
|
|
|
|
|
N |
1 |
|
|
|
|
|
|
l 4Ns 1 |
|
|
|
|
||||||||
_ |
|
|
|
0 |
_0 |
|
|
1 |
_1 |
|
|
|
4l 1 |
l 1 |
_l 1 |
|
l _l |
|
|
s |
_s |
|
|
||||||||||||
S |
t; b |
Þ ¼ |
X |
|
S |
|
|
Þ þ |
X |
|
S |
|
|
|
|
X |
|
|
S |
|
|
|
S |
|
|
Þ ¼ |
X X |
|
S |
|
|
Þ |
|||
|
b |
k |
t |
|
b |
k |
t |
|
|
|
b |
k |
t |
b |
0 |
t |
|
b |
k |
t |
|||||||||||||||
|
ð |
|
k¼0 |
k |
|
ð |
k¼0 |
k |
|
ð Þ þ þ |
|
k |
|
|
ð Þ þ |
0 |
|
ð |
s¼0 k¼0 |
k |
|
ð |
|||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
k¼0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
which after substituting (7.23) turns into: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
l |
1 |
4Ns 1 |
4s 1 |
|
|
|
0 |
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
_ |
|
|
X |
|
X X |
|
s |
_ |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
Sðt; bÞ ¼ s¼0 |
2s |
k¼0 m¼0 bkS4skþmðtÞ |
|
|
|
|
|
|
|
|
|
|
|
The double sum in k, m here contains N summands independently of s. It can be rearranged into a single sum after changing the summation index as:
|
|
|
|
|
|
|
|
|
|
4sk þ m ¼ n ) k ¼ j4sk |
|
|
|
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
n |
|
|
|
|
|
|
|
|
|
|
|
leading to (with redesignation n ! k): |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
S_ |
ð |
t; b |
Þ ¼ s¼0 |
2s |
k¼0 b4sc |
S_0 |
ð |
Þ ¼ k¼0 |
þ 2 b4c þ þ |
2l 1 |
|
4l 1 |
|
þ 2l |
|
ð |
Þ |
||||||||
|
l |
1 |
N 1 bs k |
t |
N 1 |
b0 |
|
1 b1 k |
1 |
bl 1 |
|
|
1 bl |
S_0 |
t |
|
|||||||||
|
|
|
X |
|
X |
k |
|
X |
k |
|
|
|
|
|
|
k |
|
|
|
0 |
k |
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|

Spread spectrum signature ensembles |
221 |
|
|
Then the squared distance between the group signals corresponding to different bit patterns generalizes (7.22) as:
d2 |
ð |
b; b0 |
Þ ¼ |
Eb |
k 0 |
|
þ 2 |
b4c |
þ þ 2l 1 |
4l 1 |
|
þ 2l |
"l |
|
2 |
ð |
7:24 |
Þ |
|
|
|
N 1 |
"0 |
1 |
"1 k |
1 |
"l 1 |
|
1 |
|
|
|
|||||||
|
|
|
|
|
X |
k |
|
|
|
|
k |
|
|
0 |
|
|
|
|
|
¼
where, as before, "sn ¼ 0, 2 is the difference of bits transmitted on the signature S_sk(t) in the user’s bit patterns b, b0. If all "sm, s > 0 are zeros (bits of b, b0 on all the supplementary signatures are identical), then at least one of "0k equals 2 and d2(b, b0) 4Eb. If u is a maximal layer number for which "um ¼ 2, u > 0, then a summand of (7.24) containing "um may be presented as:
1 |
2ux0 |
2u 1x1 |
2xu 1 |
1 |
2 |
4u 1 |
|
||||
|
|
|
|
|
|
where xs ¼ "sn/2 ¼ 0, 1, s ¼ 0, 1, . . . , u 1. The number in the round brackets of the modulus above is always even so the squared modulus is never smaller than one. Since there are exactly 4u terms in (7.24) entered by "um with any fixed m, we come to an estimation d2(b, b0) 4uEb/4u 1 ¼ 4Eb, proving that the oversaturated ensemble of this sort does not reduce the minimum distance of the primary orthogonal set.
In its general form the procedure described does not guarantee that the supplementary code sequences (7.23) obtained from the binary primary sequences will also be binary. To meet this latter demand, a version of the procedure may be used [57] in which primary sequences are generated as rows of the lth Kronecker power of the 4th order Hadamard matrix having an odd number of plus ones in any column.
Example 7.2.1. Let us build up an oversaturated ensemble of binary signatures of length N ¼ 16 ¼ 42. According to the scheme just discussed, 5 supplementary orthogonal signatures may be added to the N ¼ 16 primary ones (four at layer s ¼ 1 and one at layer s ¼ 2) providing total number of users K ¼ 21. In order to have all signatures binary take the Hadamard matrix:
23
þþ þ þ
H4 |
6 |
|
|
þ |
þ |
7 |
¼ |
þ |
|
þ |
|
||
|
6 |
|
|
|
|
7 |
|
4 |
þ |
|
|
þ |
5 |
having one or three plus ones in its columns and form its Kronecker square:
H16 |
H4 H4 |
|
2 |
H4 |
¼ |
|
¼ |
6 |
H4 |
H4 |
||||
|
|
|
6 |
|
|
|
|
4 |
H4 |
|
|
|
|
H4 |
H4 |
H4 |
3 |
|
H4 |
H4 |
H4 |
7 |
|
H4 |
|
H4 |
H4 |
|
H4 |
H4 |
H4 |
7 |
|
|
|
|
|
5 |

222 |
Spread Spectrum and CDMA |
|
|
Primary signatures are just rows of this matrix, i.e. in the normalized form:
a00; a01; a02; a03; a04; a05; a06; a07; a08; a09; a010; a011; a012; a013; a014; a015 T¼
|
|
|
|
0 þ þ þ þ þ þ þ þ þ þ þ þ þ þ þ þ 1 |
||||
|
|
|
|
B |
þ þ þ þ þ þ þ þ |
|||
|
|
|
|
þ þ þ þ þ þ þ þ C |
||||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
1 B |
|
|
C |
|||
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
¼ |
|
B |
|
|
C |
||
|
4 |
|
|
|||||
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
þ þ þ þ þ þ þ þ C |
|||
|
|
|
|
B |
|
|
C |
|
|
|
|
|
B |
|
|
C |
|
|
|
|
|
@ |
|
|
A |
|
|
|
|
|
|
|
þ þ þ þ þ þ þ þ |
||
Applying (7.23) to the rows of this matrix gives five supplementary binary signatures: |
||||||||
|
a1 |
|
|
|
|
|
|
þ þ þ þ þ þ þ þ þ þ þ þ |
|
0 |
|
|
|
|
|
|
|
|
a1 |
|
|
|
|
|
|
|
|
1 |
1 |
|
1 |
0 þ þ þ þ þ þ þ þ 1 |
|||
0 a1 |
|
|||||||
|
|
|||||||
|
2 |
C |
¼ 4 B |
þ þ þ þ þ þ þ þ C |
||||
B a1 |
||||||||
B |
3 |
C |
|
|
|
B |
C |
|
B a2 |
C B |
þ þ þ þ þ þ þ þ C |
||||||
B |
0 |
C |
|
|
|
B |
C |
|
@ |
|
A @ þ þ þ þ þ þ þ þ þ þ A |
It may be quite a challenge for the reader to check the minimum distance property of this oversaturated ensemble.
Let us remind ourselves that the criterion of minimum distance is adequate (at least asymptotically) whenever multiuser reception is affordable. Up to this point we have not worried about the multiuser receiver complexity. For the case of non-oversaturated systems (K N) this is not a critical matter, since—the orthogonal ensemble being optimal—multiuser reception degenerates in this case to a single-user one (see Section 4.1). On the other hand, when an oversaturated system is analysed, the opportunities for simplifying the multiuser algorithm at the cost of proper design of signatures are very important. One way to realize this approach again exploits the idea of splitting the overall N-dimensional signal space into orthogonal subspaces of smaller dimension n. However, in contrast with what was discussed above, every subspace is further