
- •Contents
- •Preface
- •1 Spread spectrum signals and systems
- •1.1 Basic definition
- •1.2 Historical sketch
- •2 Classical reception problems and signal design
- •2.1 Gaussian channel, general reception problem and optimal decision rules
- •2.2 Binary data transmission (deterministic signals)
- •2.3 M-ary data transmission: deterministic signals
- •2.4 Complex envelope of a bandpass signal
- •2.5 M-ary data transmission: noncoherent signals
- •2.6 Trade-off between orthogonal-coding gain and bandwidth
- •2.7 Examples of orthogonal signal sets
- •2.7.1 Time-shift coding
- •2.7.2 Frequency-shift coding
- •2.7.3 Spread spectrum orthogonal coding
- •2.8 Signal parameter estimation
- •2.8.1 Problem statement and estimation rule
- •2.8.2 Estimation accuracy
- •2.9 Amplitude estimation
- •2.10 Phase estimation
- •2.11 Autocorrelation function and matched filter response
- •2.12 Estimation of the bandpass signal time delay
- •2.12.1 Estimation algorithm
- •2.12.2 Estimation accuracy
- •2.13 Estimation of carrier frequency
- •2.14 Simultaneous estimation of time delay and frequency
- •2.15 Signal resolution
- •2.16 Summary
- •Problems
- •Matlab-based problems
- •3 Merits of spread spectrum
- •3.1 Jamming immunity
- •3.1.1 Narrowband jammer
- •3.1.2 Barrage jammer
- •3.2 Low probability of detection
- •3.3 Signal structure secrecy
- •3.4 Electromagnetic compatibility
- •3.5 Propagation effects in wireless systems
- •3.5.1 Free-space propagation
- •3.5.2 Shadowing
- •3.5.3 Multipath fading
- •3.5.4 Performance analysis
- •3.6 Diversity
- •3.6.1 Combining modes
- •3.6.2 Arranging diversity branches
- •3.7 Multipath diversity and RAKE receiver
- •Problems
- •Matlab-based problems
- •4 Multiuser environment: code division multiple access
- •4.1 Multiuser systems and the multiple access problem
- •4.2 Frequency division multiple access
- •4.3 Time division multiple access
- •4.4 Synchronous code division multiple access
- •4.5 Asynchronous CDMA
- •4.6 Asynchronous CDMA in the cellular networks
- •4.6.1 The resource reuse problem and cellular systems
- •4.6.2 Number of users per cell in asynchronous CDMA
- •Problems
- •Matlab-based problems
- •5 Discrete spread spectrum signals
- •5.1 Spread spectrum modulation
- •5.2 General model and categorization of discrete signals
- •5.3 Correlation functions of APSK signals
- •5.4 Calculating correlation functions of code sequences
- •5.5 Correlation functions of FSK signals
- •5.6 Processing gain of discrete signals
- •Problems
- •Matlab-based problems
- •6 Spread spectrum signals for time measurement, synchronization and time-resolution
- •6.1 Demands on ACF: revisited
- •6.2 Signals with continuous frequency modulation
- •6.3 Criterion of good aperiodic ACF of APSK signals
- •6.4 Optimization of aperiodic PSK signals
- •6.5 Perfect periodic ACF: minimax binary sequences
- •6.6 Initial knowledge on finite fields and linear sequences
- •6.6.1 Definition of a finite field
- •6.6.2 Linear sequences over finite fields
- •6.6.3 m-sequences
- •6.7 Periodic ACF of m-sequences
- •6.8 More about finite fields
- •6.9 Legendre sequences
- •6.10 Binary codes with good aperiodic ACF: revisited
- •6.11 Sequences with perfect periodic ACF
- •6.11.1 Binary non-antipodal sequences
- •6.11.2 Polyphase codes
- •6.11.3 Ternary sequences
- •6.12 Suppression of sidelobes along the delay axis
- •6.12.1 Sidelobe suppression filter
- •6.12.2 SNR loss calculation
- •6.13 FSK signals with optimal aperiodic ACF
- •Problems
- •Matlab-based problems
- •7 Spread spectrum signature ensembles for CDMA applications
- •7.1 Data transmission via spread spectrum
- •7.1.1 Direct sequence spreading: BPSK data modulation and binary signatures
- •7.1.2 DS spreading: general case
- •7.1.3 Frequency hopping spreading
- •7.2 Designing signature ensembles for synchronous DS CDMA
- •7.2.1 Problem formulation
- •7.2.2 Optimizing signature sets in minimum distance
- •7.2.3 Welch-bound sequences
- •7.3 Approaches to designing signature ensembles for asynchronous DS CDMA
- •7.4 Time-offset signatures for asynchronous CDMA
- •7.5 Examples of minimax signature ensembles
- •7.5.1 Frequency-offset binary m-sequences
- •7.5.2 Gold sets
- •7.5.3 Kasami sets and their extensions
- •7.5.4 Kamaletdinov ensembles
- •Problems
- •Matlab-based problems
- •8 DS spread spectrum signal acquisition and tracking
- •8.1 Acquisition and tracking procedures
- •8.2 Serial search
- •8.2.1 Algorithm model
- •8.2.2 Probability of correct acquisition and average number of steps
- •8.2.3 Minimizing average acquisition time
- •8.3 Acquisition acceleration techniques
- •8.3.1 Problem statement
- •8.3.2 Sequential cell examining
- •8.3.3 Serial-parallel search
- •8.3.4 Rapid acquisition sequences
- •8.4 Code tracking
- •8.4.1 Delay estimation by tracking
- •8.4.2 Early–late DLL discriminators
- •8.4.3 DLL noise performance
- •Problems
- •Matlab-based problems
- •9 Channel coding in spread spectrum systems
- •9.1 Preliminary notes and terminology
- •9.2 Error-detecting block codes
- •9.2.1 Binary block codes and detection capability
- •9.2.2 Linear codes and their polynomial representation
- •9.2.3 Syndrome calculation and error detection
- •9.2.4 Choice of generator polynomials for CRC
- •9.3 Convolutional codes
- •9.3.1 Convolutional encoder
- •9.3.2 Trellis diagram, free distance and asymptotic coding gain
- •9.3.3 The Viterbi decoding algorithm
- •9.3.4 Applications
- •9.4 Turbo codes
- •9.4.1 Turbo encoders
- •9.4.2 Iterative decoding
- •9.4.3 Performance
- •9.4.4 Applications
- •9.5 Channel interleaving
- •Problems
- •Matlab-based problems
- •10 Some advancements in spread spectrum systems development
- •10.1 Multiuser reception and suppressing MAI
- •10.1.1 Optimal (ML) multiuser rule for synchronous CDMA
- •10.1.2 Decorrelating algorithm
- •10.1.3 Minimum mean-square error detection
- •10.1.4 Blind MMSE detector
- •10.1.5 Interference cancellation
- •10.1.6 Asynchronous multiuser detectors
- •10.2 Multicarrier modulation and OFDM
- •10.2.1 Multicarrier DS CDMA
- •10.2.2 Conventional MC transmission and OFDM
- •10.2.3 Multicarrier CDMA
- •10.2.4 Applications
- •10.3 Transmit diversity and space–time coding in CDMA systems
- •10.3.1 Transmit diversity and the space–time coding problem
- •10.3.2 Efficiency of transmit diversity
- •10.3.3 Time-switched space–time code
- •10.3.4 Alamouti space–time code
- •10.3.5 Transmit diversity in spread spectrum applications
- •Problems
- •Matlab-based problems
- •11 Examples of operational wireless spread spectrum systems
- •11.1 Preliminary remarks
- •11.2 Global positioning system
- •11.2.1 General system principles and architecture
- •11.2.2 GPS ranging signals
- •11.2.3 Signal processing
- •11.2.4 Accuracy
- •11.2.5 GLONASS and GNSS
- •11.2.6 Applications
- •11.3 Air interfaces cdmaOne (IS-95) and cdma2000
- •11.3.1 Introductory remarks
- •11.3.2 Spreading codes of IS-95
- •11.3.3 Forward link channels of IS-95
- •11.3.3.1 Pilot channel
- •11.3.3.2 Synchronization channel
- •11.3.3.3 Paging channels
- •11.3.3.4 Traffic channels
- •11.3.3.5 Forward link modulation
- •11.3.3.6 MS processing of forward link signal
- •11.3.4 Reverse link of IS-95
- •11.3.4.1 Reverse link traffic channel
- •11.3.4.2 Access channel
- •11.3.4.3 Reverse link modulation
- •11.3.5 Evolution of air interface cdmaOne to cdma2000
- •11.4 Air interface UMTS
- •11.4.1 Preliminaries
- •11.4.2 Types of UMTS channels
- •11.4.3 Dedicated physical uplink channels
- •11.4.4 Common physical uplink channels
- •11.4.5 Uplink channelization codes
- •11.4.6 Uplink scrambling
- •11.4.7 Mapping downlink transport channels to physical channels
- •11.4.8 Downlink physical channels format
- •11.4.9 Downlink channelization codes
- •11.4.10 Downlink scrambling codes
- •11.4.11 Synchronization channel
- •11.4.11.1 General structure
- •11.4.11.2 Primary synchronization code
- •11.4.11.3 Secondary synchronization code
- •References
- •Index

Spread spectrum signature ensembles |
223 |
|
|
oversaturated autonomously, providing n þ nov signatures, so that all signatures from different subspaces remain orthogonal. The reason for so doing is to split an overall multiuser algorithm into N/n parallel ones, each operating in the n-dimensional subspace independently of the others. With a moderate n these partial algorithms are simple, making the whole receiver structure technologically feasible. The total number of users achievable in such a system is:
Nn ðn þ novÞ ¼ N 1 þ nnov
The problem of optimizing an ensemble of this sort is in a sense non-trivial, and just adding nov supplementary signatures to the n primary orthogonal ones does not solve it. We refer the curious reader to [58,59] for details. Another alternative is the design of signature ensembles allowing implementation of multiuser algorithms in various computational-effective iterative forms [60,61].
7.2.3 Welch-bound sequences
Let us get down to another scenario, where a priori tough limitation on the receiver complexity makes acceptable only the simplest, i.e. single-user or conventional, recep-
^
tion algorithm. In this case a decision bk on the current data symbol bk of the kth user is defined only by correlation (7.8), as though no interference except AWGN is present at the receiver input. With no loss of generality, we may admit that a current symbol is received at the interval (0,T] and put delay k and phase k in (7.8) equal to zero:
ZT
zk ¼ Y_ ðtÞS_kðtÞdt ð7:25Þ
0
When all signatures are perfectly synchronized and their number K does not exceed N, orthogonal signatures are again the best choice, since they make a single-user algorithm identical to a multiuser (ML) one. Certainly, no MAI arises in this case so ignoring all the signals of the other users does not undermine the receiver optimality. In contrast to this, the case of an oversaturated (K > N) system is of separate interest, because all signatures then cannot be orthogonal and MAI is unavoidable. Returning to (7.11), let us present the observed complex envelope as:
K
Y_ ðtÞ ¼ S_ðt; b0Þ þ N_ ðtÞ ¼ X b0lS_lðtÞ þ N_ ðtÞ
l¼1
where N_ (t) is the noise complex envelope and designation b0 ¼ (b01, b02, . . . , b0K ) symbolizes again (as in (4.8)) the genuine (i.e. unknown at the receiver) data pattern transmitted by K users to distinguish it from the one b ¼ (b1, b2, . . . , bK ) hypothesized in the course of the decision. After substituting this into (7.25) we obtain:
zk ¼ 2bk0 E þ 2E |
K |
bl0 lk þ ZT N_ ðtÞS_kðtÞdt |
ð7:26Þ |
|
X |
|
|
l¼1 |
0 |
l6¼k |

224 |
|
|
|
|
|
|
|
|
|
Spread Spectrum and CDMA |
|
|
|
|
|
|
|
|
|
|
|
1 |
|
T |
|
_ |
|
2 |
dt is (assumed the same for all users) the signature energy per one |
|||
where E ¼ 2 |
|
0 |
|
Sk(t) |
|
|||||
|
symbol, and |
lk |
kl |
is, as always, the correlation coefficient of the com- |
||||||
transmitted R |
|
|
|
|
|
|
|
|||
plex envelopes of |
the lth and¼kth signatures. The second term of (7.26) presents MAI, |
i.e. mutual interference created by the alien signals at the output of the receiver ‘tuned’ to the kth user signal. Each summand b0l lk of the sum in l (i.e. the contribution to total
MAI of the lth user signal) is random due to the randomness of users’ data symbols b0l.
For any PSK, data modulation b0l ¼ 1 and average power (variance) of each contribution to MAI is 4E2j lkj2. Naturally, all the users transmit their data independently, so that the total average power (variance) of MAI PIk at the kth receiver output is a sum in l of the powers of individual contributors:
K
X
PIk ¼ 4E2 j klj2
l¼1 l6¼k
Since this quantity evaluates the power of MAI for only the kth user receiver, to cover the whole system we may sum it in k, coming to the result:
K |
|
K |
K |
|
|
X |
X X |
j klj2 |
|
||
PI ¼ k |
1 PIk ¼ 4E2 |
k 1 l¼1 |
ð7:27Þ |
||
¼ |
|
¼ |
l k |
|
|
|
|
|
6¼ |
|
|
Now we may see that an adequate criterion of optimizing synchronous signatures, single-user reception postulated, is the minimum of the total MAI power or, equivalently, the sum of squared correlations in the expression above. Of course, again for the case K N, the orthogonal signature set creates no MAI, i.e. turns this sum into zero so that only oversaturated ensembles are of a special interest.
The criterion just introduced typically emerges in the literature as the minimum of the total squared correlation (TSC):
K |
K |
|
X X |
ð7:28Þ |
|
TSC ¼ |
j klj2¼ min |
|
k¼1 |
l¼1 |
|
which does not differ from the original one, since the sum in it is greater than the one in
(7.27) by a constant K ( kk ¼ 1).
There is a fundamental lower limit on the TSC known as the Welch bound [62]. Let
us derive it, expressing first |
the correlation coefficients in terms of elements ak, i |
||||||||||||
of the signature |
code |
sequences. Assuming |
all |
code |
sequence vectors |
||||||||
ak ¼ (ak, 0, ak, 1, . . . , ak, N 1) normalized so that kakk2¼ N, (7.19) gives: |
|||||||||||||
|
|
_ _ |
_ _ |
|
ðak; alÞ |
1 |
N 1 |
|
|||||
|
ðSk; SlÞ |
|
ðSk; SlÞ |
|
|
a a |
|||||||
|
kl ¼ |
|
¼ |
|
¼ |
|
¼ |
|
X |
k;i l;i |
|||
|
2E |
2kakkkalkE0 |
N |
N |
i |
¼ |
0 |
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
Spread spectrum signature ensembles |
225 |
|
|
Substituting this into the definition of TSC in (7.28) results in:
1 |
K K |
N 1 N 1 |
|
|
|
|
|
|
|
||
TSC ¼ |
|
X X X X |
ak;ial;iak;jal;j |
|
|
|
|||||
N2 |
k¼1 l¼1 |
i¼0 |
j¼0 |
|
|
|
|||||
¼ N2 |
|
|
ak;iak;j |
al;ial;j ¼ N2 |
ak;iak;j |
||||||
|
1 N 1 N 1 K |
|
K |
|
1 N 1 N 1 K |
|
2 |
||||
|
|
i¼0 j¼0 |
k¼1 |
|
l¼1 |
|
|
i¼0 j¼0 |
k¼1 |
|
|
|
|
X X X |
|
X |
|
|
X X |
X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Since summands in i, j are all non-negative, omitting those with different i, j never increases the sum, so that:
TSC N2 |
i¼0 |
k¼1 |
ak;i |
|
2 |
! |
ð7:29Þ |
|
1 |
N 1 |
K |
|
|
|
|
2 |
|
|
|
X |
X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
To come to the final result one may further use the Schwarz inequality, but this step becomes unnecessary in the most interesting case of PSK signatures. For any PSK alphabet jak, ij ¼ 1, which concludes the derivation of the Welch bound:
TSC N2 |
i¼0 |
k¼1 |
1! |
¼ |
N |
|
1 |
N 1 |
K |
|
2 |
K2 |
|
|
|
X X |
|
|
|
In the absence of oversaturation (K N) the straightforward corollary of definition (7.28) is a tighter bound, based on the fact that with orthogonal signatures all summands in (7.28) with unequal k, l vanish and TSC achieves its minimum equal to K. Combining the results brings about the following general form of the Welch bound:
TSC |
|
8 K; K N |
ð |
7:30 |
Þ |
||
|
> K2 |
|
|||||
|
|
> |
|
|
|
|
|
|
|
< |
|
; K > N |
|
|
|
|
|
|
|
|
|
||
|
|
> |
N |
|
|
|
|
|
|
> |
|
|
|
|
|
|
|
: |
|
|
|
|
|
Certainly, the set of sequences achieving (7.30) (Welch-bound sequences) is the best possible in total MAI criterion for a single-user receiver. But in fact, the significance of these sets goes far beyond only this feature, since Welch-bound sequences maximize the Shannon capacity of CDMA channels with AWGN and Gaussian input, the latter constraint losing its importance whenever a receive symbol SNR becomes small enough. Details of the proof of this remarkable property can be found in [63].
Since TSC includes K squared correlations of vectors with themselves, each equalling one, the difference TSC K covers only unwanted correlations between non-coinciding

226 |
Spread Spectrum and CDMA |
|
|
vectors, which we are interested to have as small as possible. There are K(K 1) such vector pairs entering TSC, so that average squared correlation 2 per pair is:
2 ¼ TSC K KðK 1Þ
giving, together with (7.30), the lower bound on this parameter:
|
|
8 |
0;KK NN |
|
|
|
|
|
||
2 |
|
|
N |
ð |
7:31 |
Þ |
||||
|
> |
|
; K |
|
|
|||||
|
|
< |
|
|
|
|
|
|
|
|
|
|
> NðK 1Þ |
|
|
|
|
||||
|
|
: |
|
|
|
|
|
|
|
|
From the way of obtaining (7.30), we may deduce how to come to the Welch boundensemble. Of course, only a non-trivial case of oversaturation should be discussed, since ways of generating orthogonal sequences have been considered previously. First of all, equality in (7.29) is a sufficient (and, of course, necessary) condition of equality in (7.30), or, considering the equation preceding (7.29), sequences for which:
K
X
ak;iak;j ¼ 0; i 6¼j
k¼1
are Welch-bound sequences. Suppose all vectors a1, a2, . . . , aK sequences are written as columns of an N K signature matrix A:
A a1a2 . . . aK |
|
2 |
a1;1 |
|
a2;1 |
|
. . . |
aK;1 |
|
|||
¼ ½ |
& ¼ |
|
a1;0 |
|
a2;0 |
|
. . . |
aK;0 |
|
|||
6 a1.;N |
|
1 |
a2;N |
|
1 |
. . . |
aK;N |
|
1 |
|||
|
|
6 |
|
|
|
|
. . . |
|
|
|||
|
|
4 |
. . |
|
. . . |
|
. . . |
|
||||
|
|
|
|
|
|
|
|
|
|
|
|
ð7:32Þ
of signature code
3
7
7
5
then (7.32) means nothing but orthogonality of the rows of A. Therefore, to build up an oversaturated (K > N) ensemble of Welch-bound sequences, one should just construct an N K matrix A with orthogonal rows. Since the dimension of rows of such a matrix is greater than their number, there is no principal prohibition on its existence. Then the desired sequences are simply columns of A.
We may now estimate the floor (i.e. noise-neglected) SIR for an oversaturated Welchbound ensemble. The total MAI power PI may be found from (7.27) and (7.28) as PI ¼ 4E2(TSC K). Since this quantity is MAI summed over K single-user receivers,
¼
an average output MAI power per receiver will be PIk PI /K. The useful (i.e. caused by the kth signature) effect at the kth receiver output expressed by the first term of (7.26) has power 4E2 (PSK modulation assumed), so that the floor power SIR with respect to an average MAI power according to (7.30) is:
qI2 ¼ |
4E2 |
¼ |
K |
¼ |
N |
ð7:33Þ |
PIk |
TSC K |
K N |